Digital Forensics and
Incident Responce
DFIR
It is a specialized field that investigates cyber incidents by
collecting, analyzing, and preserving digital evidence to understand the
nature of an attack, identify perpetrators, and prevent future
incidents
Digital forensics
Is the identifying forensic artifacts or evidence of human activity
in digital devices.
Incident response
It is the process of using cyber security expertize and leveraging
forensic information to identify activities of interest from security
perspective.
Cyber crimes
These are crimes conducted via the internet or any computer
network.
Categories of digital forensics.
- Computer forensics
- Database forensics
- Mobile device forensics
- Network forensics
Required Skills
Technical skills
- Programming languages
- Common operating systems
- Hardware & Software proficiency
- Technical writing
- Project management
- Data analysis
- Cyber security standards
Soft skills
- Analytical & curious mind.
- Confidentiality
- Perseverance
- Good communication skills
Applications of Forensics
- Legal investigations
- Corporate security incidents
- Cybersecurity research.
LAWs
- Federal Information Security Management Act(FISM)
- Gramm-Leach Bliley Act(GLBA)
- Health Insuarance Portability & Accountability Act(HIPAA)
- PCI- Data Security Standards
Forensics career
1. Law enforcement agencies
- Federal bureau investigation (FBI)
- Interpol
- Computer Emergency Readiness Team (CERT)
- National Cyber Security Centre (NCSC)
- Department of Homeland Security (DHS)
2. Cyber security firms
3. Private firms
Quick tips
- Conduct interviews of relevant parties prior to conducting live response.
- Do not wait until an incident to become familiar with the forensics process, techniques and
tool.
- A solid case is built on supporting documentation that reports where the evidence originated
and how it was handled.
- Do not use cracked or bootlegged tools.
Phases of Digital Forensics.
NIST standard process
- Preparation
- Detection and Analysis
- Containment, Eradication, Recovery
- Post-incident Activity
SANS standard process (PICERL)
- P - Preparation
- I - Identification
- C - Containment
- E - Eradication
- R - Recovery
- L - Lessons learned
My Symplified interpretation
1. Identification(What evidence is needed) - Understanding hacker
footprints
-
Preservation(Integrity)
-
Analysis(Data insights)
- Network traffic analysis
- Using OSINT tools for investigation
- Log monitoring for threat detection
- Documentation & Report
- Write down a comprehensive report on the findings.
- Presentation(Deliver evidence)
- Present your documentation to the relevant authorities.
Identification Phase
- Understanding hackers' footprints and collecting required evidence
from scene.
Interview/ interrogation
- The ability to ask questions in a way that maximizes the amount of
true information the investigator knows
❌Most people are likely to lie ie exaggerate information.
📌Close sources are high quality & trustworthy
Data Recovery
An attempt to pull out as much information from the data as
possible.
- Collect broken hard drives
- Crashed servers
- Recover deleted files
- Look into compromised devices
- Photorec
- tsk_recover
- The sleuth kit
- foremost
- Extudelete
- USBRip - history of USB events
Event reconstruction
Traditional forensics analysis - Fingerprints - Blood - Hair -
Handwriting - Currency
Undercover investigation
Is where a digital forensics guy pretends to be an attacker to gain
community trust so as to get more first hand information.
Camouflage/hide/be part of
hackers:
- Darkweb marketplaces
- Hacker forums
- Hackers social groups i.e Reddit, WhatsApp, facebook etc
Preservation phase.
This process ensures that our digital evidence is not contaminated
and remains safe while analyzing.
Chain of custody
Any person not related to the investigations must not posses the
evidence.
Order of volatility
Digital forensics is often volatile(will be lost forever if not
captured in time) i.e RAM
Timeline creation
A timeline of events needs to br created for efficient and accurate
analysis.
Tools Kroll Artifact Parser & Extractor(KAPE)
Intelligence gathering
Open source intelligence
- Publicly available
- Github
- Social media content
Close source intelligence
This is information gained from non-public sources.
Past cases
Law enforcement
Police operations
Millitary
& intelligence sources
Private organizations
Internet service providers (ISP)
Disk Analysis
Disk Analysis
Disk analysis is the process of examining a computer's hard drive
to recover and analyze data.
Disk Analysis Tools
Password cracking
- This techniques will enable you to unlock compromised media.
- John the ripper
- Hashcat
- Aircrack-ng
- Cain and Abel
- DVCS Ripper
Memory Analysis
Most valuable information can be found within memory dumps(RAM image
files)
Volatility workflow
- Run strings for clues.
- Identify the image profile i.e OS type, version etc.
- Dump processes & look for suspicious processes.
- Dump data related to interesting processes.
- View data in a format relating to the process i.e word: .docx,
notepad: .txt etc
-
Profile identification
$python vol.py -f ~/images.raw imageinfo
-
Dump processes
$python vol.py -f ~/image.raw pslist --profile=Win7SP0x64 pstree
-
Process memory dump
$python vol.py -f ~/image.raw --profile=Win7SP0x64 memdump -p 2019 -D dump/
Network Analysis
Documentation and Reporting
The report Should be:
✅Clear
✅ Concise
✅ Consistent
External Resources
Books
Videos
Websites