So the next part of preserving evidence is capturing the data that is on the screen
as you see it when you arrived on scene.
So one of the first things that you're going to look for are open files,
and the open files can be saved, using the safe as function to a forensically wiped thumb drive for external storage device. And again we talked about. We will show you in the hands on portion out to forensically wipe a thumb drive and prepare it for your evidence collection.
That being said, collecting those open files they should be completed after you have collected that volatile data. Just to ensure that you're not changing the state of the system
on then also keeping month inserting a thumb drive will record information about that device onto your victim machine.
The next piece of onscreen data that you want to look for is going to be the taskbar,
and it's going to show most of the programs running on the computer, so that will be down the very right hand bottom corner of the screen.
The next process, you're going to look for open windows, some programs they can run on the desktop. They're not going to show up in the taskbar. So just like open files, being able to peruse through the window and see what's what is there and what's not there and then taking a photograph of any type
of open window that you may have,
particularly they've got into. Some various website may be able to save
that website to your thumb drive. But also taking a picture of the website will not hurt,
and then the system trade programs could be hidden in that location. GADGETS Sidebar on your felt relatively recently
recent Windows Systems You'll see some gadgets, sometimes sidebars on the right hand side, under computer
and then, lastly, recording the system's dating time, which you'll see down in the taskbar.
Blow, uh, in the bottom right hand corner of your screen.
So if you have a system that is power off and you need to obtain the system date time,
you can go through the bios in order to do that, so essentially would be photographing the interior and exterior that system,
and then you would power on the system and enter the set up move. And then, if you don't know how to do that, you could follow the on screen instructions that are presented during that menu. Argue can use Google on your forensic machine to try and figure out which key that you're going to press. Could be escaped.
Well, he pretty common keys. In order to help get you into that setup mode from that set up move, you can then find that system date and time information and then power down the system. That being said, if you are not able to stop
the system before it
goes past that boot mode, you'll want to immediately power down that system.
by doing a hard power down, you would not want the system to to begin to load the operating system so that it's just a consideration
and the next you wantto know, take the configuration. Hard drives of that system
document each setting for the device on attack you find or none,
and then for used refined setting, you're gonna want record all settings to include cylinders heads, pretty cop in logical block. Addressing
all of that information should be contained
within that set up in you
cell moving on from there we have Thio essentially conduct a triage
of the data once we become on scene.
that being said, when we get there, we have to know what information that we're looking for.
So when we're processing information,
if we have certain types of incidents such as malware, suspicious sports, remote users or suspicious processes
collecting that bottle town data
maybe very much importance.
However, if we have other types of cases where we suspect there may be no forest images, documents, videos
determining user activity, registry information, Nonviolence, all data, maybe more important
so identifying what requirements you have and what will answer.
So figuring out what you need to get,
should be important when you're looking at doing that triage. So
are you looking for running processes listening for its pilotless registry, please Network connections central, essentially identifying a requirement and then going out trying to find the data that's going to answer that requirement
and then, lastly, after you've kind of identified what you need to get, how are you going to get it? What tools are techniques do you need to use to get the information you need so you can use f k in case volatilities, redline dumping coffee helix
Matt Marshall Memorize Rapture Cyst Internal sweet access data Tree up There are literally hundreds of tools out there to use to acquire data and to analyze data. So having a broad familiarity
with a lot of tools and knowing how to use them
will behoove you in your forensic investing.
After you have conducted that basic triage of the system and you have collected all of the onscreen data,
it has been time for the imaging process. So there are different types of images what we're going to use as we want a forensic, and that is going to be a file that includes a bit for bit copy of specified data on the types of
files that you will see. Our
E one files E x one files 81 files on the 810.1
and then there are different types of images. You will have a physical image, which is a bit for bit copy of a single physical storage device that is more than likely going to be your best evidence.
However, you also have a logical image that is, one could be a bit for bit copy of one of more partitions.
Regardless, if the partitions have been formatted with a foul system
a logical image you're generally going to collect from a system that is powered on.
And you would collect that if you feel that you cannot get a physical image of the system, are the physical image of system you might get would be useless for, say, if it had some type of encryption on the system and you were not able to obtain wth E unlocked keys
and the last type of images a targeted image and that is going to be a bit for a copy of a specified target data, usually a file folder,
and that will also be considered a logical image.