Time
10 hours 19 minutes
Difficulty
Intermediate
CEU/CPE
12

Video Transcription

00:05
when conducting digital investigations. A basic set of forensic tools is required.
00:10
This collection of tools maybe refer to as a forensic investigation. Sweet.
00:15
It includes software for supporting tasks ranging from imaging and decrypting discs, cracking passwords and reviewing logs
00:22
before starting data examination or evidence extraction on a disk or device. An exact bit level image of the original source needs created.
00:31
This ensures the original data is not compromised and is admissible if needed. For legal proceedings.
00:37
A bit level image is made from any removable media.
00:40
A hash using either the MD five or Shaw algorithms is calculated from both sources and then compared to validate the integrity of the copy.
00:49
Once a bit level images created, data analysis commences using the image copy. Never the original.
00:56
There are many different tools for image analysis.
00:59
In case software is available in a number of products used for forensics and analytics,
01:03
it's commonly used to create forensic images, recover data from hard drives and conduct end up analysis of user files and the registry.
01:11
Another application, F T K or forensic tool kit is similar to in case and used to image and scan hard drives as well as compute hashes, find deleted files and crack encryption using discovered text rings or rainbow tables
01:26
with Windows systems. A group of tools known assist internals that are commonly used to manage, troubleshoot and diagnose system and application issues is also used to perform forensic research and analysis of the operating system and processes.
01:40
Many newer forensic tools were developed in response to the increased use of mobile devices. Victim is an open source mobile forensics tool. It allows investigators the ability to view and manipulate data on most types of mobile phones.
01:53
Another popular tool is celebrate, which connects to mobile phones and safely collect evidence while bypassing the lock mechanism.
02:00
Because most users locked their devices with passwords, investigators need password crackers to bypass the authentication to access the data stored on the device.
02:09
John the Ripper is a free password cracking application that works with most operating systems. Dictionary attack and brute force are the two most common cracking modes used by John the Ripper.
02:20
Cain and Abel is similar to John the Ripper but is used exclusively on window systems.
02:24
It uses network packet sniffing and brute force techniques for discovering and cracking passwords.
02:30
Users may also encrypt the data on the device, using tools like that locker true crypt or PGP.
02:37
When an investigator needs to analyze data that is encrypted and they don't have the decryption key or password, a tool to break the encryption is needed.
02:45
ElcomSoft is a forensic tool that is widely used by the government, military and law enforcement.
02:50
It features password recovery and encryption abilities, along with extraction and analysis tools.
02:55
Another useful resource for digital forensic investigators is device logs,
03:00
log management and viewing tools eight and locating in analyzing logs produced by different operating systems and devices and collected in a centralized location.
03:09
Log data can highlight a trail, provide a piece to an incident, puzzle or help scope examination needs for the investigator
03:16
and forensic investigations. Multiple investigators may work with the same evidence analyzing different aspects of it, depending on their role in investigation.
03:25
To ensure the evidence is not compromised and remains admissible in court. A chain of custody is followed.
03:31
A chain of custody chronologically records, sequence of custody, control exchange and nature of analysis of the evidence.
03:38
The list must include every individual who came in contact with the evidence and insurers. They're accountable for what happens during that time.
03:46
A forensic investigation suite of tools is an essential component. The digital investigation
03:52
having the right tool for a given scenario is critical to enable an investigator to access and analyze the data without impacting the integrity.
04:00
A prepared tool sweep along with a dedicated forensic work station, our core to a well managed and effective digital investigation.

Up Next