investigation

E-Mail Forensic Investigation Techniques

E-Mail Forensic Investigation Techniques

E-mail forensics refers to the study of source and content of e-mail as evidence to spot the actual sender and recipient of a message, data/time of transmission, detailed record of e-mail transaction, intent of the sender, etc. This study involves investigation of metadata, keyword searching, port scanning, etc. for authorship attribution and identification of e-mail scams. Various approaches that are used for e-mail forensic are described in and are briefly defined below: 5.1. Header Analysis …

E-Mail Forensic Investigation Techniques Read More »

Mobile Forensic Overview

Mobile Forensic Overview

iPhone leveling Understanding the varied sorts of mobile acquisition tools and therefore the data they’re capable of recovering is paramount for a mobile forensic examiner. A mobile device forensic tool arrangement was developed by Sam Brothers, a computer and mobile forensic examiner and researcher. the target of his arrangement is to enable an examiner to put telephone and GPS forensic tools into a category, counting on the extraction methodology of that tool. This categorization facilitates …

Mobile Forensic Overview Read More »

Cyber Crime Investigation

Cyber Crime Investigation : Tools and Techniques

As new reports come to light and digital news agencies show cybercrime on the increase , it’s clear that cybercrime investigation plays a critical role keep the web safe. Traditional enforcement government agencies are now called upon to research not only real-world crimes, but also crimes on the web . Many well-known federal agencies even publish and update the “most wanted” list of cyber criminals, within the same way we’ve seen traditional criminals listed and …

Cyber Crime Investigation : Tools and Techniques Read More »

Understanding-Examine- file-systems

Understanding Examine File Systems

Understanding Examine file systems is imperative to access to the file system data and to rebuild the file system events. File systems comprise of five sections, namely, file system data, content data, metadata, file name, and file system application data. File system data The file system data gives details about the file system structure, like file system and file system block size, number of allocated blocks etc. 1. Content data This data has most of …

Understanding Examine File Systems Read More »

Other-Important-Information-of-forensic-Investigation

Other Important Information of Forensic Investigation

In this article explain Other Important Information of forensic Investigation using investigator. Clipboard Contents Clipboard is a temporary storage area, where the system stores data during copy and paste operations. Most Windows applications provide this functionality through the Edit option on the menu bar, Clicking Edit reveals a drop-down menu, which contains choices, like cut, copy, and paste. The user selects text or other data, chooses copy, and then chooses Paste to insert that data …

Other Important Information of Forensic Investigation Read More »

Anti-Forensics Techniques that Minimize Footprint

Anti-Forensics Techniques that Minimize Footprint

This article is based on Footprint and their Anti-Forensics Techniques like Memory injection and Syscall Proxying, Userland Execve Technique, Syscall proxying, Exploiting Forensics Tools Bugs,Detecting Forensic Tool Activities Memory injection and Syscall Proxying In the buffer over–flow exploit attack, the attackers use buffer overflows as entry to a remote system in order to inject and run code in the address space of a running program, thereby successfully altering the victim program’s behavior. Then, the attacker …

Anti-Forensics Techniques that Minimize Footprint Read More »

Understand-Anti-forensics-and-their-goals

Understand Anti-forensics and their goals

Understand Anti-forensics and their goals, also referred to as counter forensics, may be a set of techniques that attackers or perpetrators use so as to avert or sidetrack the forensic investigation process or attempt to make it much harder. These techniques negatively impact the number and quality of evidence from a criminal offense scene, thereby making the forensic investigation process difficult. Therefore, the investigator may need to conduct a few more additional steps so as …

Understand Anti-forensics and their goals Read More »

Writing-th- Investigation-Report-&-Testifying-in-the-Court-Room

Writing the Investigation Report & Testifying in the Court Room

In this article explain Writing the Investigation Report , Testifying in the Court Room & Closing the Case in detail. Writing the Investigation Report Report writing is a crucial stage in the outcome of the investigation, as it summarizes all the investigation process into a readable report, presented to a court of law. Based on the accuracy and certainty of this report, the court will prosecute the suspects. The report should be clear, concise, and …

Writing the Investigation Report & Testifying in the Court Room Read More »

Understand-the-Chain-of-Custody-and-It’s-Importance

Understand the Chain of Custody and It’s Importance

Understand the Chain of Custody and It’s Importance In this Chain of custody is a legal document that demonstrates the progression of evidence as it travels from the original evidence location to the forensic laboratory. It is a roadmap that shows how investigators collected, analyzed, and preserved the evidence. The investigators need to present this document in court. It ensures accurate auditing of the original data evidence, imaging of the source media, tracking of the …

Understand the Chain of Custody and It’s Importance Read More »

Planning-the-Search-and-Seizure-of-investigation

Planning the Search and Seizure of investigation

Planning the Search and Seizure of investigation in this investigators need to design a strategic process to conduct the search and seizure process after analyzing the crime scene. This will help them distribute tasks between the team members to complete the seizure and allow the team to use time and tools in a well-defined manner. Initial Search of the Scene Once the forensic team has arrived at the scene and unloaded their equipment, they will …

Planning the Search and Seizure of investigation Read More »