OSINT / Dox / Forensic Introduction to Forensics

TaskMaster

New member
Lucifer
Joined
Jul 23, 2022
Messages
6
Hellcoins
♆346
Computer forensics (forensics) is an applied science of solving crimes related to computer information, the study of digital evidence, methods of searching, obtaining and fixing such evidence. It consists of three parts:
  • Data collection is the process of obtaining information from the original source without damaging or altering it. There are many tools for this, depending on the OS and other features, in the article we will consider Linux-based tools.
  • Data Preservation - Received digital evidence must be stored in its original state using cryptographic hashing algorithms.
  • Data analysis is the interpretation of data and the extraction of information from them.

Data Gathering
If a suspect has installed rootkits to destroy evidence on command, there is a chance that important content will be lost. In such cases, an evidence chain is used - a document with information about how the evidence was processed, for further reporting. The chain begins with the processing of evidence.

Before you start, you need to prepare:
  • a boot disk or flash drive, as suspects' tools cannot be trusted;
  • powerful machine for the investigator.
First you need to get the data that is the most volatile. In fact, they change already when they are collected, so you should try to leave as few traces as possible. This is a difficult task, since conventional tools can make changes to the environment under study. For example, using the cp command will change the last time the source file was accessed. Let's take a look at some of the tools.
You must reply before you can see the hidden data contained here.
 
Top