Track 5 session 2 - st dev con 2016 - security iot best practicesST_World
油
This document summarizes a presentation on IoT security good practices. It discusses various types of invasive and non-invasive attacks on IoT devices, as well as solutions to improve security such as adding a secure element, using an MCU's security features, and risk management practices. Cryptography methods that can be used for authentication, encryption and integrity are explained. The document also covers topics like secure boot, secure storage, secure communications, and the importance of security over the entire product lifecycle. Recommendations are made to design fortified products, understand risks, use security features and tools, and work with trusted partners.
Intrusion detection systems collect information from systems and networks to analyze for signs of intrusion. Digital evidence encompasses any digital data that can establish a crime or link a crime to a victim or perpetrator. It is important to properly collect, preserve, and identify digital evidence using forensically-sound procedures to avoid altering or destroying the original evidence. This involves creating bit-stream copies of storage devices, documenting the collection and examination process, and verifying the integrity of evidence.
際際滷s for a college course based on "Incident Response & Computer Forensics, Third Edition" by by Jason Luttgens, Matthew Pepe, and Kevin Mandia.
Teacher: Sam Bowne
Website: https://samsclass.info/121/121_F16.shtml
This document discusses incident response and handling. It outlines the key steps in the incident response process: preparation, identification, containment, eradication, recovery, and lessons learned. Preparation involves forming a response team, developing procedures, and gathering resources. Identification involves determining the scope of an incident and preserving evidence. Containment focuses on limiting the damage of an incident through actions like quarantining systems, analyzing initial data, and making backups. Eradication aims to completely remove malicious software from affected systems.
Forensics analysis and validation: Determining what data to collect and analyze, validating forensic data, addressing data-hiding techniques, performing remote acquisitions Network Forensics: Network forensics overview, performing live acquisitions, developing standard procedures for network forensics, using network tools, examining the honeynet project.
Examining computer and evidence collectiongagan deep
油
This document discusses computer forensics and evidence collection in the cloud computing environment. It defines computer forensics and its aims to identify, analyze and present digital evidence legally. Evidence can be found in various sources like logs, storage media, browsers and memory. Logs provide details of activities, attacks and errors. Evidence is also collected from cloud storage and browsing history. Physical memory analysis allows retrieval of volatile data from memory dumps.
Digital forensics is a scientific field that involves the identification, collection, examination, and analysis of digital data for use as evidence in court. It has several sub-disciplines including computer forensics, network forensics, mobile device forensics, digital image/video/audio forensics, memory forensics, and cloud forensics. The goal of digital forensics is to recover electronic evidence from computers, networks, mobile devices, and digital media in a forensically sound manner.
Ethical Hacking n VAPT presentation by Suvrat jainSuvrat Jain
油
a perfect example of your 6 weeks summer training ppt. Course-Ethical Hacking , its info and VAPT- Vulnerability Assessment n Penetration testing. about how vulnerability scanning , tools used , cracking password , etc.
Digital Forensic tools were presented including FTK Imager and Wireshark. FTK Imager allows previewing and imaging of evidence to create forensic copies without altering original data. It can mount images and generate hash reports. Wireshark is an open source network analysis tool for live capture and offline analysis across platforms. Email forensic tools like Sintelix, Aid4Mail, MailXaminer and MailPro+ were also discussed for investigations, analysis, processing and visualization of email data. Computer forensic analysis involves documenting activities, authenticating discoveries, and examining hardware and files while preserving metadata. Information warfare can involve disrupting communications, spreading disinformation through media, and sabotaging networks and financial systems using surveillance and cyber means
This document provides an overview of computer forensics. It defines computer forensics as the process of preserving, identifying, extracting, documenting and interpreting computer media for legal evidence. It discusses what constitutes digital evidence and provides examples of computer forensic investigations. It also outlines the reasons for collecting digital evidence, who uses computer forensics, and the basic steps involved in a computer forensics investigation. Finally, it discusses methods of hiding and detecting hidden data.
This document discusses computer forensics as it relates to investigating a Windows system for a pharmaceutical company. It covers gathering volatile system data through the use of tools run from a trusted CD, acquiring memory and filesystem images over the network, and analyzing these images to identify files, registry entries, and other artifacts that can provide a timeline of system activity and detect any unauthorized use. The goal is to preserve forensic evidence in a way that is admissible in court.
This document discusses various types of threat hunting and provides examples of threat hunting use cases. The main types of threat hunting covered are IOC based, hypotheses based, baseline based, and anomaly based threat hunting. Several threat hunting use cases are then described in more detail, including hunting for abnormal cmd.exe spawns, suspicious RDP activities, stopping of Windows defensive services, and suspicious task scheduler usage. The document concludes with an overview of how to conduct an end to end threat hunting process by defining hypotheses and hunting across various data sources and platforms.
際際滷s for a college course based on "Incident Response & Computer Forensics, Third Edition" by by Jason Luttgens, Matthew Pepe, and Kevin Mandia, at City College San Francisco.
Website: https://samsclass.info/152/152_F18.shtml
This document discusses best practices for collecting, preserving, and analyzing digital evidence. It covers topics such as data recovery, backup solutions, hidden data recovery techniques, evidence collection methods, and standards for ensuring digital evidence is authenticated and verified. The goal is to extract useful information from seized devices and recovered data in a way that can be used in a court of law to identify attackers and reconstruct security incidents.
Making pentesting sexy ossams - BSidesQuebec2013BSidesQuebec2013
油
This document provides an overview and agenda for a presentation titled "Making PenTesting Analysis Sexy!" The presenter has extensive experience in security and is the creator of OSSAMS, an open source security assessment management system. The presentation covers penetration testing methodology, workflow, automation solutions to integrate tools and correlate data, and a demonstration of the OSSAMS tool. The goal is to provide a unified way to manage security assessments and correlate data from multiple tools.
Computer forensics involves the legal acquisition, preservation, analysis and presentation of digital evidence found on computers and digital devices. It follows standard processes and guidelines to ensure evidence is collected properly and can be used in legal cases. The main steps are acquisition of evidence from devices, identification and evaluation of relevant data found, and proper presentation of findings. Computer forensics experts work in law enforcement, private companies, and other organizations to gather digital evidence for various crimes and disputes.
This document provides an overview of computer forensics, including definitions, purposes, processes, and tools. It defines computer forensics as finding digital evidence to support hypotheses by examining sources like hard drives, logs, and portable storage. Key steps are outlined, such as acquiring volatile memory-resident data before powering down systems. Methods for acquiring evidence from workstations, servers, and network devices are described. Common file system locations that may contain evidence are listed. Tools mentioned include dd, The Sleuth Kit, Autopsy, HELIX, and Windows Forensic Toolchest.
The document discusses computer forensics in the context of investigating a Windows system. It outlines the process of gathering volatile data like memory contents and network connections using tools run from a trusted CD. Non-volatile data like the filesystem is acquired by imaging the entire disk. Timeline analysis uses data from files, registry keys and logs to determine when files and events occurred. The goal is to methodically identify and preserve digital evidence while following forensic standards.
The document discusses various types of intruders including masqueraders, misfeasors, and clandestine users. It also covers intrusion techniques like password cracking, intrusion detection methods using statistical anomaly detection and rule-based approaches, and the importance of audit records and covering tracks to hide evidence of intrusion. Distributed intrusion detection systems are also mentioned as a more effective defense approach.
Digital forensics involves recovering and investigating material from digital devices, often related to computer crimes. The process includes seizing devices, imaging their contents, analyzing the data, and producing a report of evidence. Digital forensics has evolved over 30 years to address evolving crimes and now analyzes data from computers, networks, and mobile devices using specialized tools and methodologies. Skills required for digital forensics experts include technical, analytical, and legal expertise.
This document provides an overview of cyber forensics. It introduces Ambuj Kumar, a cyber security analyst, and discusses topics like the cyber forensics process, goals of forensics investigations, how computers are used in cybercrimes, types of investigations and evidence, challenges in acquiring evidence, roles of first responders, locations of electronic evidence, the chain of custody process, and techniques like hashing, write protection, and analyzing deleted data.
Digital forensics is a scientific field that involves the identification, collection, examination, and analysis of digital data for use as evidence in court. It has several sub-disciplines including computer forensics, network forensics, mobile device forensics, digital image/video/audio forensics, memory forensics, and cloud forensics. The goal of digital forensics is to recover electronic evidence from computers, networks, mobile devices, and digital media in a forensically sound manner.
Ethical Hacking n VAPT presentation by Suvrat jainSuvrat Jain
油
a perfect example of your 6 weeks summer training ppt. Course-Ethical Hacking , its info and VAPT- Vulnerability Assessment n Penetration testing. about how vulnerability scanning , tools used , cracking password , etc.
Digital Forensic tools were presented including FTK Imager and Wireshark. FTK Imager allows previewing and imaging of evidence to create forensic copies without altering original data. It can mount images and generate hash reports. Wireshark is an open source network analysis tool for live capture and offline analysis across platforms. Email forensic tools like Sintelix, Aid4Mail, MailXaminer and MailPro+ were also discussed for investigations, analysis, processing and visualization of email data. Computer forensic analysis involves documenting activities, authenticating discoveries, and examining hardware and files while preserving metadata. Information warfare can involve disrupting communications, spreading disinformation through media, and sabotaging networks and financial systems using surveillance and cyber means
This document provides an overview of computer forensics. It defines computer forensics as the process of preserving, identifying, extracting, documenting and interpreting computer media for legal evidence. It discusses what constitutes digital evidence and provides examples of computer forensic investigations. It also outlines the reasons for collecting digital evidence, who uses computer forensics, and the basic steps involved in a computer forensics investigation. Finally, it discusses methods of hiding and detecting hidden data.
This document discusses computer forensics as it relates to investigating a Windows system for a pharmaceutical company. It covers gathering volatile system data through the use of tools run from a trusted CD, acquiring memory and filesystem images over the network, and analyzing these images to identify files, registry entries, and other artifacts that can provide a timeline of system activity and detect any unauthorized use. The goal is to preserve forensic evidence in a way that is admissible in court.
This document discusses various types of threat hunting and provides examples of threat hunting use cases. The main types of threat hunting covered are IOC based, hypotheses based, baseline based, and anomaly based threat hunting. Several threat hunting use cases are then described in more detail, including hunting for abnormal cmd.exe spawns, suspicious RDP activities, stopping of Windows defensive services, and suspicious task scheduler usage. The document concludes with an overview of how to conduct an end to end threat hunting process by defining hypotheses and hunting across various data sources and platforms.
際際滷s for a college course based on "Incident Response & Computer Forensics, Third Edition" by by Jason Luttgens, Matthew Pepe, and Kevin Mandia, at City College San Francisco.
Website: https://samsclass.info/152/152_F18.shtml
This document discusses best practices for collecting, preserving, and analyzing digital evidence. It covers topics such as data recovery, backup solutions, hidden data recovery techniques, evidence collection methods, and standards for ensuring digital evidence is authenticated and verified. The goal is to extract useful information from seized devices and recovered data in a way that can be used in a court of law to identify attackers and reconstruct security incidents.
Making pentesting sexy ossams - BSidesQuebec2013BSidesQuebec2013
油
This document provides an overview and agenda for a presentation titled "Making PenTesting Analysis Sexy!" The presenter has extensive experience in security and is the creator of OSSAMS, an open source security assessment management system. The presentation covers penetration testing methodology, workflow, automation solutions to integrate tools and correlate data, and a demonstration of the OSSAMS tool. The goal is to provide a unified way to manage security assessments and correlate data from multiple tools.
Computer forensics involves the legal acquisition, preservation, analysis and presentation of digital evidence found on computers and digital devices. It follows standard processes and guidelines to ensure evidence is collected properly and can be used in legal cases. The main steps are acquisition of evidence from devices, identification and evaluation of relevant data found, and proper presentation of findings. Computer forensics experts work in law enforcement, private companies, and other organizations to gather digital evidence for various crimes and disputes.
This document provides an overview of computer forensics, including definitions, purposes, processes, and tools. It defines computer forensics as finding digital evidence to support hypotheses by examining sources like hard drives, logs, and portable storage. Key steps are outlined, such as acquiring volatile memory-resident data before powering down systems. Methods for acquiring evidence from workstations, servers, and network devices are described. Common file system locations that may contain evidence are listed. Tools mentioned include dd, The Sleuth Kit, Autopsy, HELIX, and Windows Forensic Toolchest.
The document discusses computer forensics in the context of investigating a Windows system. It outlines the process of gathering volatile data like memory contents and network connections using tools run from a trusted CD. Non-volatile data like the filesystem is acquired by imaging the entire disk. Timeline analysis uses data from files, registry keys and logs to determine when files and events occurred. The goal is to methodically identify and preserve digital evidence while following forensic standards.
The document discusses various types of intruders including masqueraders, misfeasors, and clandestine users. It also covers intrusion techniques like password cracking, intrusion detection methods using statistical anomaly detection and rule-based approaches, and the importance of audit records and covering tracks to hide evidence of intrusion. Distributed intrusion detection systems are also mentioned as a more effective defense approach.
Digital forensics involves recovering and investigating material from digital devices, often related to computer crimes. The process includes seizing devices, imaging their contents, analyzing the data, and producing a report of evidence. Digital forensics has evolved over 30 years to address evolving crimes and now analyzes data from computers, networks, and mobile devices using specialized tools and methodologies. Skills required for digital forensics experts include technical, analytical, and legal expertise.
This document provides an overview of cyber forensics. It introduces Ambuj Kumar, a cyber security analyst, and discusses topics like the cyber forensics process, goals of forensics investigations, how computers are used in cybercrimes, types of investigations and evidence, challenges in acquiring evidence, roles of first responders, locations of electronic evidence, the chain of custody process, and techniques like hashing, write protection, and analyzing deleted data.
How to Configure Flexible Working Schedule in Odoo 18 EmployeeCeline George
油
In this slide, well discuss on how to configure flexible working schedule in Odoo 18 Employee module. In Odoo 18, the Employee module offers powerful tools to configure and manage flexible working schedules tailored to your organization's needs.
Blind Spots in AI and Formulation Science Knowledge Pyramid (Updated Perspect...Ajaz Hussain
油
This presentation delves into the systemic blind spots within pharmaceutical science and regulatory systems, emphasizing the significance of "inactive ingredients" and their influence on therapeutic equivalence. These blind spots, indicative of normalized systemic failures, go beyond mere chance occurrences and are ingrained deeply enough to compromise decision-making processes and erode trust.
Historical instances like the 1938 FD&C Act and the Generic Drug Scandals underscore how crisis-triggered reforms often fail to address the fundamental issues, perpetuating inefficiencies and hazards.
The narrative advocates a shift from reactive crisis management to proactive, adaptable systems prioritizing continuous enhancement. Key hurdles involve challenging outdated assumptions regarding bioavailability, inadequately funded research ventures, and the impact of vague language in regulatory frameworks.
The rise of large language models (LLMs) presents promising solutions, albeit with accompanying risks necessitating thorough validation and seamless integration.
Tackling these blind spots demands a holistic approach, embracing adaptive learning and a steadfast commitment to self-improvement. By nurturing curiosity, refining regulatory terminology, and judiciously harnessing new technologies, the pharmaceutical sector can progress towards better public health service delivery and ensure the safety, efficacy, and real-world impact of drug products.
Useful environment methods in Odoo 18 - Odoo 際際滷sCeline George
油
In this slide well discuss on the useful environment methods in Odoo 18. In Odoo 18, environment methods play a crucial role in simplifying model interactions and enhancing data processing within the ORM framework.
QuickBooks Desktop to QuickBooks Online How to Make the MoveTechSoup
油
If you use QuickBooks Desktop and are stressing about moving to QuickBooks Online, in this webinar, get your questions answered and learn tips and tricks to make the process easier for you.
Key Questions:
* When is the best time to make the shift to QuickBooks Online?
* Will my current version of QuickBooks Desktop stop working?
* I have a really old version of QuickBooks. What should I do?
* I run my payroll in QuickBooks Desktop now. How is that affected?
*Does it bring over all my historical data? Are there things that don't come over?
* What are the main differences between QuickBooks Desktop and QuickBooks Online?
* And more
Blind spots in AI and Formulation Science, IFPAC 2025.pdfAjaz Hussain
油
The intersection of AI and pharmaceutical formulation science highlights significant blind spotssystemic gaps in pharmaceutical development, regulatory oversight, quality assurance, and the ethical use of AIthat could jeopardize patient safety and undermine public trust. To move forward effectively, we must address these normalized blind spots, which may arise from outdated assumptions, errors, gaps in previous knowledge, and biases in language or regulatory inertia. This is essential to ensure that AI and formulation science are developed as tools for patient-centered and ethical healthcare.
Finals of Kaun TALHA : a Travel, Architecture, Lifestyle, Heritage and Activism quiz, organized by Conquiztadors, the Quiz society of Sri Venkateswara College under their annual quizzing fest El Dorado 2025.
APM People Interest Network Conference 2025
-Autonomy, Teams and Tension: Projects under stress
-Tim Lyons
-The neurological levels of
team-working: Harmony and tensions
With a background in projects spanning more than 40 years, Tim Lyons specialised in the delivery of large, complex, multi-disciplinary programmes for clients including Crossrail, Network Rail, ExxonMobil, Siemens and in patent development. His first career was in broadcasting, where he designed and built commercial radio station studios in Manchester, Cardiff and Bristol, also working as a presenter and programme producer. Tim now writes and presents extensively on matters relating to the human and neurological aspects of projects, including communication, ethics and coaching. He holds a Masters degree in NLP, is an NLP Master Practitioner and International Coach. He is the Deputy Lead for APMs People Interest Network.
Session | The Neurological Levels of Team-working: Harmony and Tensions
Understanding how teams really work at conscious and unconscious levels is critical to a harmonious workplace. This session uncovers what those levels are, how to use them to detect and avoid tensions and how to smooth the management of change by checking you have considered all of them.
Database population in Odoo 18 - Odoo slidesCeline George
油
In this slide, well discuss the database population in Odoo 18. In Odoo, performance analysis of the source code is more important. Database population is one of the methods used to analyze the performance of our code.
APM People Interest Network Conference 2025
- Autonomy, Teams and Tension
- Oliver Randall & David Bovis
- Own Your Autonomy
Oliver Randall
Consultant, Tribe365
Oliver is a career project professional since 2011 and started volunteering with APM in 2016 and has since chaired the People Interest Network and the North East Regional Network. Oliver has been consulting in culture, leadership and behaviours since 2019 and co-developed HPTM速an off the shelf high performance framework for teams and organisations and is currently working with SAS (Stellenbosch Academy for Sport) developing the culture, leadership and behaviours framework for future elite sportspeople whilst also holding down work as a project manager in the NHS at North Tees and Hartlepool Foundation Trust.
David Bovis
Consultant, Duxinaroe
A Leadership and Culture Change expert, David is the originator of BTFA and The Dux Model.
With a Masters in Applied Neuroscience from the Institute of Organisational Neuroscience, he is widely regarded as the Go-To expert in the field, recognised as an inspiring keynote speaker and change strategist.
He has an industrial engineering background, majoring in TPS / Lean. David worked his way up from his apprenticeship to earn his seat at the C-suite table. His career spans several industries, including Automotive, Aerospace, Defence, Space, Heavy Industries and Elec-Mech / polymer contract manufacture.
Published in Londons Evening Standard quarterly business supplement, James Caans Your business Magazine, Quality World, the Lean Management Journal and Cambridge Universities PMA, he works as comfortably with leaders from FTSE and Fortune 100 companies as he does owner-managers in SMEs. He is passionate about helping leaders understand the neurological root cause of a high-performance culture and sustainable change, in business.
Session | Own Your Autonomy The Importance of Autonomy in Project Management
#OwnYourAutonomy is aiming to be a global APM initiative to position everyone to take a more conscious role in their decision making process leading to increased outcomes for everyone and contribute to a world in which all projects succeed.
We want everyone to join the journey.
#OwnYourAutonomy is the culmination of 3 years of collaborative exploration within the Leadership Focus Group which is part of the APM People Interest Network. The work has been pulled together using the 5 HPTM速 Systems and the BTFA neuroscience leadership programme.
https://www.linkedin.com/showcase/apm-people-network/about/
How to use Init Hooks in Odoo 18 - Odoo 際際滷sCeline George
油
In this slide, well discuss on how to use Init Hooks in Odoo 18. In Odoo, Init Hooks are essential functions specified as strings in the __init__ file of a module.
Prelims of Kaun TALHA : a Travel, Architecture, Lifestyle, Heritage and Activism quiz, organized by Conquiztadors, the Quiz society of Sri Venkateswara College under their annual quizzing fest El Dorado 2025.
How to Modify Existing Web Pages in Odoo 18Celine George
油
In this slide, well discuss on how to modify existing web pages in Odoo 18. Web pages in Odoo 18 can also gather user data through user-friendly forms, encourage interaction through engaging features.
APM event hosted by the South Wales and West of England Network (SWWE Network)
Speaker: Aalok Sonawala
The SWWE Regional Network were very pleased to welcome Aalok Sonawala, Head of PMO, National Programmes, Rider Levett Bucknall on 26 February, to BAWA for our first face to face event of 2025. Aalok is a member of APMs Thames Valley Regional Network and also speaks to members of APMs PMO Interest Network, which aims to facilitate collaboration and learning, offer unbiased advice and guidance.
Tonight, Aalok planned to discuss the importance of a PMO within project-based organisations, the different types of PMO and their key elements, PMO governance and centres of excellence.
PMOs within an organisation can be centralised, hub and spoke with a central PMO with satellite PMOs globally, or embedded within projects. The appropriate structure will be determined by the specific business needs of the organisation. The PMO sits above PM delivery and the supply chain delivery teams.
For further information about the event please click here.
2. Securing a Digital Incident or Crime Scene
When investigating a digital incident or crime scene, securing
the environment is critical to preserving evidence, maintaining
its integrity, and ensuring proper chain of custody. Below are the
key steps and best practices to follow:
3. 1. Initial Assessment
Identify the Incident: Understand the nature of the digital crime or incident. Is it a
data breach, unauthorized access, malware attack, or insider threat?
Preserve Volatile Data: Certain data (like information in RAM, network traffic, or
running processes) can be lost quickly. Use specialized tools to capture this
information before shutting down systems.
Document the Scene: Take detailed notes, photographs, and screenshots of what
you observe in real-time. Record system states, open programs, and logged-in users.
2. Isolate the Affected Systems
Prevent Further Damage: Disconnect affected systems from the network to
prevent data exfiltration, remote access, or malware spreading. However, avoid
turning off devices unless absolutely necessary, as valuable evidence may be lost.
Secure Physical Access: Ensure that only authorized personnel can access the
crime scene. Lock down rooms, servers, or computers involved in the incident.
4. 3. Maintain Chain of Custody
Document Everything: Every interaction with the digital evidence must be thoroughly
documented, including who accessed the systems, what actions were taken, and when.
Use Tamper-Evident Methods: Seal and tag storage media (e.g., hard drives, USBs) and log their
transfers to maintain the integrity of the evidence.
Custody Logs: Keep a log of who has handled the evidence from the time of discovery to its
presentation in court, ensuring that it has been properly secured and is unaltered.
4. Preserve Evidence
Forensic Imaging: Create exact copies (forensic images) of storage devices to analyze them while
keeping the original evidence intact.
Use write-blocking devices to ensure that no changes are made to the original media.
Verify the integrity of forensic images using cryptographic hashes (e.g., MD5, SHA256).
Data Types: Preserve all types of evidence, including logs, emails, IP addresses, user credentials,
encrypted files, network traffic, and system configuration data.
Document Metadata: Note timestamps, file permissions, and access details to avoid tampering or
deletion concerns.
5. 5.Protecting Network Evidence
Network Logs: Capture network logs (e.g., firewall, router, VPN) as soon as possible to
understand traffic patterns and potential external connections during the incident.
Traffic Analysis: Use packet sniffers or intrusion detection systems (IDS) to capture and
analyze live network traffic for suspicious behavior, such as exfiltration attempts or
malware communication.
6. Securing Cloud-Based Evidence
Collaborate with Cloud Providers: Work with cloud service providers to capture logs,
access records, and other cloud-based evidence. Understand that cloud data can be
volatile and may require legal action (e.g., subpoenas) for retrieval.
Audit Logs: Retrieve audit logs from the cloud environment showing user activities,
such as logins, file access, or modifications.
Snapshots and Backups: Secure cloud snapshots and backups as potential sources of
evidence.
6. 7. Ensure Legal Compliance
Privacy Laws: Ensure compliance with local laws and regulations, such as GDPR, HIPAA,
or CCPA, when handling digital evidence containing personal information.
Warrants and Permissions: Obtain proper legal authorization (e.g., search warrants) when
accessing sensitive or personal data. Unauthorized access could lead to evidence being
inadmissible in court.
Third-Party Involvement: If third parties, such as contractors or employees of service
providers, are involved, their actions should also be documented and justified.
8. Collaboration with Law Enforcement and Forensics Experts
Involve Forensic Experts: Digital forensics experts should be called in to handle evidence
properly, analyze systems, and produce reports that will hold up in court.
Coordinate with Law Enforcement: If the incident is a criminal matter, law enforcement
agencies need to be contacted. Ensure smooth coordination by following proper procedures
and maintaining a clear chain of custody.
7. 9. Post-Incident Analysis and Reporting
Post-Incident Documentation: After securing evidence, provide a thorough report that includes:
Timeline of the incident.
Methods used to secure and collect evidence.
Analysis of the compromised systems and suspected causes.
Lessons Learned: Document and communicate the findings to improve the organizations security
posture and reduce the likelihood of future incidents.
Forensic Tools Used: Clearly document the forensic tools (e.g., EnCase, FTK, Wireshark) used
during the investigation to establish the authenticity of the findings.
10. Final Considerations
Avoid Contamination: Be cautious when interacting with digital evidence. Any alterations can
compromise its admissibility in court.
Use Authorized Tools: Only use certified forensic tools that are accepted by courts and industry
standards to collect and analyze data.
9. Obtaining digital hash
Obtaining a digital hash is an essential process in digital forensics, ensuring the integrity and authenticity of
digital evidence. A digital hash is a cryptographic value generated from a file, drive, or set of data that uniquely
identifies its contents. This value serves as a "digital fingerprint," making it possible to verify that the data has
not been altered. Heres how you can obtain a digital hash:
Steps for Obtaining a Digital Hash
1.Select a Hashing Algorithm
The choice of the hashing algorithm is crucial. Common algorithms include:
MD5 (Message Digest Algorithm 5): Produces a 128-bit hash value. It is fast but vulnerable to collision
attacks (where two different files produce the same hash).
SHA-1 (Secure Hash Algorithm 1): Generates a 160-bit hash. Stronger than MD5 but still susceptible to
certain attacks.
SHA-256: Part of the SHA-2 family, it generates a 256-bit hash value and is highly secure, making it
widely recommended for forensic purposes.
10. 2. Prepare the Environment
Ensure that your forensic workstation or tool is ready for hashing. When obtaining a hash from a
physical storage device (like a hard drive), its critical to use a write-blocker to prevent any changes
to the original data.
Isolation: Make sure the evidence is disconnected from networks or external influences to avoid
unintentional modifications.
3. Select the Appropriate Tool
You can use various tools to generate a hash:
Forensic Tools:
FTK Imager: A powerful tool for creating forensic images and generating hashes.
EnCase: A well-known commercial tool used for forensic imaging and analysis.
Autopsy: An open-source digital forensics tool that supports hashing and other analysis
features.
Command-Line Utilities:
Linux/Unix: Use md5sum, sha1sum, or sha256sum to generate the hash of a file or device.
Windows: Use certutil or PowerShell cmdlets such as Get-FileHash.
11. 4. Obtain the Hash
Hashing a File:
Using FTK Imager:
1.
Open FTK Imager and load the file or drive to be hashed.
2.
Right-click on the file or drive and choose "Create Disk Image."
3.
FTK Imager will calculate the hash value (MD5 and SHA-1 are usually calculated by default).
4.
Document the hash values provided.
Using Command Line:
Open the terminal or command prompt and run the appropriate command:
For MD5:
md5sum /path/to/file
For SHA-1:
sha1sum /path/to/file
For SHA-256:
sha256sum /path/to/file
The output will display the hash value followed by the file name.
Hashing a Hard Drive:
Using FTK Imager:
1.
Select the entire hard drive or partition as the source.
2.
Choose "Create Image" and specify the destination where you want the image saved.
3.
FTK Imager will calculate the hash for the entire drive and display the values (MD5, SHA-1, or SHA-256).
Using Command Line:
For Linux-based systems, you can generate a hash for the entire drive:
sha256sum /dev/sdX
Replace /dev/sdX with the appropriate device identifier.
12. 5. Document the Hash
Record Hash Values: Make sure to write down the hash values generated by the tool, including the
algorithm used (MD5, SHA-1, or SHA-256).
Additional Information:
File or drive name.
Date and time the hash was created.
Tool or software used to generate the hash.
Operating system and version used in the process.
6. Verify the Hash
Verification: After copying or imaging the file or drive, generate a new hash of the copied data and
compare it to the original hash value.
Consistency Check: If the two hash values match, it means that the data is intact and has not been
altered.
13. 7. Store the Hash Securely
Store the hash values in a secure place, such as a digital evidence log or chain-of-
custody document. This ensures that the integrity of the data can be verified at any
point in the investigation.
8. Using Hashes in Legal and Investigative Contexts
Present the hash as part of the forensic report, demonstrating that the evidence has
remained unchanged since it was collected.
Hash values can also be used to identify duplicate files, detect malware, and verify
file integrity across different systems