An automated timeline reconstruction approach for digital forensic investigations Christopher Hargreaves and Jonathan Patterson, DFRWS 2012

Size: px
Start display at page:

Download "An automated timeline reconstruction approach for digital forensic investigations Christopher Hargreaves and Jonathan Patterson, DFRWS 2012"

Transcription

1 An automated timeline reconstruction approach for digital forensic investigations Christopher Hargreaves and Jonathan Patterson, DFRWS 2012 Original presentation at DFRWS: Original paper:

2 Presentation Introduction Research Objectives Reconstruction of high-level events Super TimeLine Generation of low-level events Results and Future Work 2

3 Introduction - What is TimeLine? A timeline is a way of displaying a list of events in chronological order. Visualization 3

4 DF TimeLines A digital timeline can be defined as the representation of useful information relating to specific security event. Carbone R, Bean

5 Traditional DF TimeLines Problems Credibility Modification of timestamps during what can be called normal user or operating system behavior Automated scanning tool File attribute manipulation program such as timestomp (Anti-forensics) 5

6 TimeLines Problems (cont.) BIOS and System Clock Setting Multi-user System Disabling of Last Access Update in the system altering or creating a DWORD entry called NtfsDisableLastAccessUpdate with the value of 1 in the key: HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Control\FileSystem Chow

7 NTFS Unpopular Property Time is recorded in two places $STDINFO Attribute $Filename Attribute 7

8 Other TimeStamps Sources Event Logs Registry Files Internet History Files Recycle Bin\Recycler thumbs.db Logs Chat Logs Restore Points Internet / Network Capture Files Archive Files 8

9 Super TimeLine One of the solutions to the shortcomings of traditional timeline analysis is expanding it with information from multiple sources to get a better picture of the events. Guðjónsson

10 Existing Super TimeLine Tools Timelines based on file system times e.g. EnCase, Sleuth Kit Timelines including times from inside files e.g. Cyber Forensic Time Lab (CFTL), Log2timeline Visualizations e.g. EnCase, Zeitline, Aftertime 10

11 Aftertime Netherlands Forensic Institute (NFI Labs) Aftertime, 11

12 Zeitline Buchholz, F. & Falk, C., Design and Implementation of Zeitline: a Forensic Timeline Editor. Digital Forensics Research Workshop. 12

13 Cyber Forensic Time Lab (CFTL) Olsson, J. & Boldt, M., Computer forensic timeline visualization tool. Digital Investigation, 6(Supplement 1), pp.s78 S87. 13

14 Log2timeline Gu jónsson, K., Mastering the Super Timeline with log2timeline. 14

15 Super TimeLine Problems Super timeline often contains too many events for the investigator : to understand. to fully analyze. making data reduction. making easier method of examining the timeline essential. Guðjónsson

16 Research Objectives Needs to provide a gist - a summary of activity on the disk. Need an event reconstruction tool that produces human understandable events. Needs to satisfy forensic requirements, particularly traceability, repeatability. Needs to be extensible, i.e. allow the community to Add. 16

17 Overview of PyDFT (Python Digital Forensic Timeline) Two main stages: low-level event extraction high-level event reconstruction The research method in this case is the development of a software prototype chosen over a design-based approach 17

18 Overview of PyDFT Prototype disk image low-level event Database high-timeline 18

19 Generation of low-level events Extractor Manager (file name, path, content) Parsers (generate usable values ) Bridges (maps values) Time Extractor 19

20 Low-level event format 20

21 Backing store for the low-level timeline internally in PyDFT, low-level events are implemented as a Python class. SQLite multiple advanced queries offer performance benefits Export to several other formats 21

22 SQLite DataBase Three tables : Info (timeline tool). Events (main). Keydata (keys). SQLite database containing millions of low-level events 22

23 Events Table in PyDFT DataBase 23

24 Reconstruction of high-level events The approach is based on a plugin framework where each plugin Analyzer is a script that detects a particular type of high-level event 24

25 Automated Analysis Analysis Concept (simple) 25

26 Analysis Concept (complex) Reasoning (Trigger, Supporting, Contradictory) 26

27 Simple test events (Example) 27

28 Test Events (YouTube Example) 28

29 YouTube Example (Cont.) 29

30 Events Comparing (Example) 30

31 Pseudo Code of Analyzer Only 22 analyzers implemented. Some examples of which include (User Creation, Windows Installation, Google Search, YouTube Video Access, Skype Call and USB Connected) 31

32 Analyzer (Example) 32

33 High-level event format 33

34 Supporting and contradictory artifacts 34

35 Case folder structure 35

36 Results - Examples (Bing Search) 36

37 Bing Search (Cont.) 37

38 Examples (USB Device Connection) 38

39 USB Device Connection (Cont.) Test Events: Trigger event : Setup API entry for USB found (VID:07AB PID:FCF6 Serial:07A80207B128BE08) Setup API USBSTOR entry found USBStor details found in Registry Windows Portable Device entry found in Registry 39

40 Visualizing high-level timelines using Timeflow 40

41 Timeflow (Cont.) 41

42 Performance 42

43 Future Work More extractors including importing from other tools. More complex analyzers. More Testing. More efficient Comparison method Parallel processing. Visualizations. 43

44 44

45 45

A Survey : Server timeline analysis for web forensics

A Survey : Server timeline analysis for web forensics A Survey : Server timeline analysis for web forensics Rohit Chandrawanshi 1,Hitesh Gupta 2 Research Scholar 1, HOD 2, Dept. of Software System Patel College of Science and Technology Bhopal, India [email protected]

More information

Advanced Registry Forensics with Registry Decoder. Dr. Vico Marziale Sleuth Kit and Open Source Digital Forensics Conference 2012 10/03/2012

Advanced Registry Forensics with Registry Decoder. Dr. Vico Marziale Sleuth Kit and Open Source Digital Forensics Conference 2012 10/03/2012 Advanced Registry Forensics with Registry Decoder Dr. Vico Marziale Sleuth Kit and Open Source Digital Forensics Conference 2012 10/03/2012 Who am I? Senior Security Researcher @ DFS Published Researcher

More information

A Day in the Life of a Cyber Tool Developer

A Day in the Life of a Cyber Tool Developer A Day in the Life of a Cyber Tool Developer by Jonathan Tomczak [email protected] Jonathan Tomczak ( Front Man ) Software Engineer w/ over 7 years experience working in software and web development Dave

More information

Automatic Timeline Construction For Computer Forensics Purposes

Automatic Timeline Construction For Computer Forensics Purposes Automatic Timeline Construction For Computer Forensics Purposes Yoan Chabot, Aurélie Bertaux, Christophe Nicolle and Tahar Kechadi CheckSem Team, Laboratoire Le2i, UMR CNRS 6306 Faculté des sciences Mirande,

More information

Event Reconstruction: A state of the art

Event Reconstruction: A state of the art Event Reconstruction: A state of the art ABSTRACT Event reconstruction is one of the most important step in digital forensic investigations. It allows investigators to have a clear view of the events that

More information

Computer forensic timeline visualization tool

Computer forensic timeline visualization tool available at www.sciencedirect.com journal homepage: www.elsevier.com/locate/diin Computer forensic timeline visualization tool Jens Olsson*, Martin Boldt Blekinge Institute of Technology, School of Computing,

More information

Computer forensic timeline visualization tool

Computer forensic timeline visualization tool available at www.sciencedirect.com journal homepage: www.elsevier.com/locate/diin Computer forensic timeline visualization tool Jens Olsson*, Martin Boldt Blekinge Institute of Technology, School of Computing,

More information

PTK Forensics. Dario Forte, Founder and Ceo DFLabs. The Sleuth Kit and Open Source Digital Forensics Conference

PTK Forensics. Dario Forte, Founder and Ceo DFLabs. The Sleuth Kit and Open Source Digital Forensics Conference PTK Forensics Dario Forte, Founder and Ceo DFLabs The Sleuth Kit and Open Source Digital Forensics Conference What PTK is about PTK forensics is a computer forensic framework based on command line tools

More information

Digital Forensic Techniques

Digital Forensic Techniques Digital Forensic Techniques Namrata Choudhury, Sr. Principal Information Security Analyst, Symantec Corporation Professional Techniques T23 CRISC CGEIT CISM CISA AGENDA Computer Forensics vs. Digital Forensics

More information

Digital Forensics. Tom Pigg Executive Director Tennessee CSEC

Digital Forensics. Tom Pigg Executive Director Tennessee CSEC Digital Forensics Tom Pigg Executive Director Tennessee CSEC Definitions Digital forensics Involves obtaining and analyzing digital information as evidence in civil, criminal, or administrative cases Analyze

More information

Automated Identification and Reconstruction of YouTube Video Access

Automated Identification and Reconstruction of YouTube Video Access Automated Identification and Reconstruction of YouTube Video Access Jonathan Patterson 1, Christopher Hargreaves 2 Centre for Forensic Computing, Cranfield University, Shrivenham SN6 8LA 1 [email protected],

More information

The Forensic Analysis of the Microsoft Windows Vista Recycle Bin. By Mitchell Machor [email protected]

The Forensic Analysis of the Microsoft Windows Vista Recycle Bin. By Mitchell Machor MMachor@gmail.com The Forensic Analysis of the Microsoft Windows Vista Recycle Bin By Mitchell Machor [email protected] 1/22/2008 - 1 - Introduction Contrary to due belief, when a file is deleted on a Microsoft operating

More information

EVENT LOG MANAGEMENT...

EVENT LOG MANAGEMENT... Event Log Management EVENT LOG MANAGEMENT... 1 Overview... 1 Application Event Logs... 3 Security Event Logs... 3 System Event Logs... 3 Other Event Logs... 4 Windows Update Event Logs... 6 Syslog... 6

More information

Digital Forensics. Module 4 CS 996

Digital Forensics. Module 4 CS 996 Digital Forensics Module 4 CS 996 Hard Drive Forensics Acquisition Bit for bit copy Write protect the evidence media EnCase for DOS Safeback (NTI: www.forensics-intl.com) Analysis EnCase FTK (www.accessdata.com)

More information

1. Data Domain Pre-requisites. 2. Enabling OST

1. Data Domain Pre-requisites. 2. Enabling OST 1. Data Domain Pre-requisites Before we begin to configure NetBackup, we need to verify the following:- Administrator rights and network access to the NetBackup master and media servers That the NetBackup

More information

Digital Forensics Tutorials Acquiring an Image with FTK Imager

Digital Forensics Tutorials Acquiring an Image with FTK Imager Digital Forensics Tutorials Acquiring an Image with FTK Imager Explanation Section Digital Forensics Definition The use of scientifically derived and proven methods toward the preservation, collection,

More information

How to start with 3DHOP

How to start with 3DHOP How to start with 3DHOP Package content, local setup, online deployment http://3dhop.net 30/6/2015 The 3DHOP distribution Where to find it, what s inside The 3DHOP distribution package From the page http://3dhop.net/download.php

More information

MALWAREBYTES PLUGIN DOCUMENTATION

MALWAREBYTES PLUGIN DOCUMENTATION Contents Requirements... 2 Installation Scenarios... 2 Malwarebytes 2.xx or 1.75 is already deployed.... 2 Install / Update Malwarebytes Plugin... 3 Configuring Malwarebytes Plugin... 5 About the Screens...

More information

Cloud based Storage Drive Forensics

Cloud based Storage Drive Forensics Cloud based Storage Drive Forensics Prashant Bhatt 1, Mr. Naresh Kumar Gardas 2, Ms. Shweta Chawla 3, Moin Khorajiya 4 1 PG Student, Network Security, GTU PG School, Ahmedabad, Gujarat, India 2 Course-Coordinator,

More information

KofaxExpress. Installation Guide 3.1.0 2012-05-01

KofaxExpress. Installation Guide 3.1.0 2012-05-01 KofaxExpress 3.1.0 Installation Guide 2012-05-01 2008-2012 Kofax, Inc., 15211 Laguna Canyon Road, Irvine, California 92618, U.S.A. All rights reserved. Use is subject to license terms. Third-party software

More information

Forensics source: Edward Fjellskål, NorCERT, Nasjonal sikkerhetsmyndighet (NSM)

Forensics source: Edward Fjellskål, NorCERT, Nasjonal sikkerhetsmyndighet (NSM) s Unix Definition of : Computer Coherent application of a methodical investigatory techniques to solve crime cases. Forensics source: Edward Fjellskål, NorCERT, Nasjonal sikkerhetsmyndighet (NSM) s Unix

More information

Exchange Brick-level Backup and Restore

Exchange Brick-level Backup and Restore WHITEPAPER BackupAssist Version 4 Exchange Mailbox Add-on www.backupassist.com 2 Contents 1. Introduction and Overview... 3 1.1 What does the Exchange Mailbox Add-on do?... 3 1.2 Who needs the Exchange

More information

Topics in basic DBMS course

Topics in basic DBMS course Topics in basic DBMS course Database design Transaction processing Relational query languages (SQL), calculus, and algebra DBMS APIs Database tuning (physical database design) Basic query processing (ch

More information

CYBER FORENSICS. KRISHNA SASTRY PENDYALA Cyber Forensic Division Central Forensic Science Laboratory Hyderabad.

CYBER FORENSICS. KRISHNA SASTRY PENDYALA Cyber Forensic Division Central Forensic Science Laboratory Hyderabad. CYBER FORENSICS KRISHNA SASTRY PENDYALA Cyber Forensic Division Central Forensic Science Laboratory Hyderabad. 11 DIGITAL EVIDENCE? Cyber crimes Digital evidence Digital evidence is any information of

More information

Copyright 2014 http://itfreetraining.com

Copyright 2014 http://itfreetraining.com This video looks at the four file systems supported by Windows. These are ReFS, NTFS, FAT and exfat. The video looks at what each file system is capable of and its limitations. Resilient File System (ReFS)

More information

Automating the Computer Forensic Triage Process With MantaRay

Automating the Computer Forensic Triage Process With MantaRay Automating the Computer Forensic Triage Process With MantaRay Senior Computer Forensic Analysts Doug Koster & Kevin Murphy Worlds best Summer Intern Chapin Bryce GMU RCFG Conference August 2013 1 MantaRay

More information

Wireless Security Camera with the Arduino Yun

Wireless Security Camera with the Arduino Yun Wireless Security Camera with the Arduino Yun Created by Marc-Olivier Schwartz Last updated on 2014-08-13 08:30:11 AM EDT Guide Contents Guide Contents Introduction Connections Setting up your Temboo &

More information

Digital Forensics with Open Source Tools

Digital Forensics with Open Source Tools Digital Forensics with Open Source Tools Cory Altheide Harlan Carvey Technical Editor Ray Davidson AMSTERDAM BOSTON HEIDELBERG LONDON NEW YORK OXFORD PARIS SAN DIEGO SAN FRANCISCO SINGAPORE SYDNEY TOKYO

More information

Recovering and Analyzing Deleted Registry Files

Recovering and Analyzing Deleted Registry Files Recovering and Analyzing Deleted Registry Files Andrew Case Digital Forensics Solutions [email protected] / @attrc I had a case recently where I was asked to investigate any signs of data exfiltration

More information

CHAD TILBURY. [email protected]. http://forensicmethods.com @chadtilbury

CHAD TILBURY. chad@forensicmethods.com. http://forensicmethods.com @chadtilbury CHAD TILBURY [email protected] 0 Former: Special Agent with US Air Force Office of Special Investigations 0 Current: Incident Response and Computer Forensics Consultant 0 Over 12 years in the trenches

More information

Mobile memory dumps, MSAB and MPE+ Data collection Information recovery Analysis and interpretation of results

Mobile memory dumps, MSAB and MPE+ Data collection Information recovery Analysis and interpretation of results Mobile memory dumps, MSAB and MPE+ Data collection Information recovery Analysis and interpretation of results Physical Extraction Physical extraction involves either Removing chips from circuit board

More information

About database backups

About database backups About database backups What is a backup? A backup refers to making copies of data so that these additional copies may be used to restore the original after a data loss event. Backups are useful primarily

More information

Computer Forensics using Open Source Tools

Computer Forensics using Open Source Tools Computer Forensics using Open Source Tools COMP 5350/6350 Digital Forensics Professor: Dr. Anthony Skjellum TA: Ananya Ravipati Presenter: Rodrigo Sardinas Overview Use case explanation Useful Linux Commands

More information

NaviCell Data Visualization Python API

NaviCell Data Visualization Python API NaviCell Data Visualization Python API Tutorial - Version 1.0 The NaviCell Data Visualization Python API is a Python module that let computational biologists write programs to interact with the molecular

More information

MSP Center Plus Features Checklist

MSP Center Plus Features Checklist Features Checklist Your evaluation is not complete until you check out top vendors and the price. Here is a list prepared based customer queries. Features General Easy web interface with admin, technician,

More information

Guide to Computer Forensics and Investigations, Second Edition

Guide to Computer Forensics and Investigations, Second Edition Guide to Computer Forensics and Investigations, Second Edition Chapter 4 Current Computer Forensics Tools Objectives Understand how to identify needs for computer forensics tools Evaluate the requirements

More information

RecoverIt Frequently Asked Questions

RecoverIt Frequently Asked Questions RecoverIt Frequently Asked Questions Windows Recovery FAQs When can I use Windows Recovery application? This application is used to recover the deleted files from internal or external storage devices with

More information

Notepad++ The COMPSCI 101 Text Editor for Windows. What is a text editor? Install Python 3

Notepad++ The COMPSCI 101 Text Editor for Windows. What is a text editor? Install Python 3 Notepad++ The COMPSCI 101 Text Editor for Windows The text editor that we will be using in the Computer Science labs for creating our Python programs is called Notepad++ and http://notepad-plus-plus.org

More information

Membership Card Maintenance (Club Spa Maintenance)

Membership Card Maintenance (Club Spa Maintenance) Membership Card Maintenance (Club Spa Maintenance) Membership Cards require information to be held in the Club Spa System Options screen. The fields required are Image Folder and Layout Folder. Image Folder

More information

Just EnCase. Presented By Larry Russell CalCPA State Technology Committee May 18, 2012

Just EnCase. Presented By Larry Russell CalCPA State Technology Committee May 18, 2012 Just EnCase Presented By Larry Russell CalCPA State Technology Committee May 18, 2012 What is e-discovery Electronically Stored Information (ESI) Discover or Monitor for Fraudulent Activity Tools used

More information

Steven Kaplan, CISSP, CISA Accuvant [email protected] Sandra Bittner, CISSP Arizona Public Service Palo Verde Nuclear Generating Station

Steven Kaplan, CISSP, CISA Accuvant skaplan@accuvant.com Sandra Bittner, CISSP Arizona Public Service Palo Verde Nuclear Generating Station Steven Kaplan, CISSP, CISA Accuvant [email protected] Sandra Bittner, CISSP Arizona Public Service Palo Verde Nuclear Generating Station The Challenge: Commercial generation facilities must identify

More information

Scalable Forensics with TSK and Hadoop. Jon Stewart

Scalable Forensics with TSK and Hadoop. Jon Stewart Scalable Forensics with TSK and Hadoop Jon Stewart CPU Clock Speed Hard Drive Capacity The Problem CPU clock speed stopped doubling Hard drive capacity kept doubling Multicore CPUs to the rescue!...but

More information

OpenAdmin Tool for Informix (OAT) October 2012

OpenAdmin Tool for Informix (OAT) October 2012 OpenAdmin Tool for Informix (OAT) October 2012 What is OpenAdmin Tool for Informix? OAT is a web-based administration tool for the IBM Informix database server A single OAT installation can administer

More information

Analyzing Network Servers. Disk Space Utilization Analysis. DiskBoss - Data Management Solution

Analyzing Network Servers. Disk Space Utilization Analysis. DiskBoss - Data Management Solution DiskBoss - Data Management Solution DiskBoss provides a large number of advanced data management and analysis operations including disk space usage analysis, file search, file classification and policy-based

More information

How to Prepare for the Upgrade to Microsoft Dynamics CRM 2013 (On-premises)

How to Prepare for the Upgrade to Microsoft Dynamics CRM 2013 (On-premises) How to Prepare for the Upgrade to Microsoft Dynamics CRM 2013 (On-premises) COMPANY: Microsoft Corporation RELEASED: September 2013 VERSION: 1.0 Copyright This document is provided "as-is". Information

More information

Windows 10 Forensics. 175 Lakeside Ave, Room 300A Phone: (802)865-5744 Fax: (802)865-6446 http://www.lcdi.champlain.edu

Windows 10 Forensics. 175 Lakeside Ave, Room 300A Phone: (802)865-5744 Fax: (802)865-6446 http://www.lcdi.champlain.edu Windows 10 Forensics 175 Lakeside Ave, Room 300A Phone: (802)865-5744 Fax: (802)865-6446 http://www.lcdi.champlain.edu 4/22/2015 Disclaimer: This document contains information based on research that has

More information

Things to consider before you do an In-place upgrade to Windows 10. Setup Info. In-place upgrade to Windows 10 Enterprise with SCCM

Things to consider before you do an In-place upgrade to Windows 10. Setup Info. In-place upgrade to Windows 10 Enterprise with SCCM In this doc we will see the steps for In-place upgrade to Windows 10 Enterprise with SCCM. Most of the Organizations today are running Windows 7 on their computers. Looking at the stability and features

More information

CA Desktop Migration Manager

CA Desktop Migration Manager CA Desktop Migration Manager DMM Deployment Setup Guide 12.9 This Documentation, which includes embedded help systems and electronically distributed materials, (hereinafter referred to as the Documentation

More information

Debug Logging. Guide

Debug Logging. Guide Debug Logging Guide The information contained in this document ("the Material") is believed to be accurate at the time of printing, but no representation or warranty is given (express or implied) as to

More information

Computer Forensic Capabilities

Computer Forensic Capabilities Computer Forensic Capabilities Agenda What is computer forensics? Where to find computer evidence Forensic imaging Forensic analysis What is Computer Forensics? The preservation, identification, extraction,

More information

C HFI C HFI. EC-Council. EC-Council. Computer Hacking Forensic Investigator. Computer. Computer. Hacking Forensic INVESTIGATOR

C HFI C HFI. EC-Council. EC-Council. Computer Hacking Forensic Investigator. Computer. Computer. Hacking Forensic INVESTIGATOR Page: 1 TM C HFI Computer C HFI Computer Hacking Forensic INVESTIGATOR Hacking Forensic INVESTIGATOR TM v8 v8 Page: 2 Be the leader. Deserve a place in the CHFI certified elite class. Earn cutting edge

More information

ALERT installation setup

ALERT installation setup ALERT installation setup In order to automate the installation process of the ALERT system, the ALERT installation setup is developed. It represents the main starting point in installing the ALERT system.

More information

Programming Hadoop 5-day, instructor-led BD-106. MapReduce Overview. Hadoop Overview

Programming Hadoop 5-day, instructor-led BD-106. MapReduce Overview. Hadoop Overview Programming Hadoop 5-day, instructor-led BD-106 MapReduce Overview The Client Server Processing Pattern Distributed Computing Challenges MapReduce Defined Google's MapReduce The Map Phase of MapReduce

More information

Avira Rescue System. HowTo

Avira Rescue System. HowTo Avira Rescue System HowTo Table of contents 1. Introduction... 3 2. System Requirements... 4 3. Product availability... 4 4. Product features... 5 5. Using the Rescue System... 6 5.1 The BIOS setup...6

More information

ACE STUDY GUIDE. 3. Which Imager pane shows information specific to file systems such as HFS+, NTFS, and Ext2? - Properties Pane

ACE STUDY GUIDE. 3. Which Imager pane shows information specific to file systems such as HFS+, NTFS, and Ext2? - Properties Pane ACE STUDY GUIDE *Note* All of the actual exam questions are in multiple choice format. This Study Guide is designed to cover all of the material on the exam, 1. FTK Imager supports the encryption of forensic

More information

U.S. Navy Automated Software Testing

U.S. Navy Automated Software Testing U.S. Navy Automated Software Testing Application of Standards to the Automated Test and Re-Test (ATRT) Effort Object Management Group (OMG) Technical Meeting June 2007 Approved for public release; distribution

More information

Preliminary Slides. These are rough rough drafts of my final slides. The most up-to-date version that was used at DEFCON20 will be posted online

Preliminary Slides. These are rough rough drafts of my final slides. The most up-to-date version that was used at DEFCON20 will be posted online Preliminary Slides These are rough rough drafts of my final slides The most up-to-date version that was used at DEFCON20 will be posted online 1 Anti-Forensics and Anti-Anti-Forensics by Michael Perklin

More information

EnCase 7 - Basic + Intermediate Topics

EnCase 7 - Basic + Intermediate Topics EnCase 7 - Basic + Intermediate Topics Course Objectives This 4 day class is designed to familiarize the student with the many artifacts left behind on Windows based media and how to conduct a forensic

More information

COMPREHENSIVE STUDY OF DIGITAL FORENSICS

COMPREHENSIVE STUDY OF DIGITAL FORENSICS COMPREHENSIVE STUDY OF DIGITAL FORENSICS Jatinder kaur, Gurpal Singh SMCA, Thapar University, Patiala-147004, India [email protected], [email protected] Abstract This paper presenting the review

More information

Digital Forensic Analyses of Web Browser Records

Digital Forensic Analyses of Web Browser Records Digital Forensic Analyses of Web Browser Records Erhan Akbal1*, Fatma Güneş1, Ayhan Akbal2 1 Department of Digital Forensics Engineering, Fırat University Technology Faculty, 23119, Elazig, Turkey. Department

More information

14.1. bs^ir^qfkd=obcib`qflk= Ñçê=emI=rkfuI=~åÇ=léÉåsjp=eçëíë

14.1. bs^ir^qfkd=obcib`qflk= Ñçê=emI=rkfuI=~åÇ=léÉåsjp=eçëíë 14.1 bs^ir^qfkd=obcib`qflk= Ñçê=emI=rkfuI=~åÇ=léÉåsjp=eçëíë bî~äì~íáåö=oéñäéåíáçå=ñçê=emi=rkfui=~åç=lééåsjp=eçëíë This guide walks you quickly through key Reflection features. It covers: Getting Connected

More information

Getting Started with Turbo Your PC

Getting Started with Turbo Your PC Getting Started with Turbo Your PC Over time your computer becomes slow simply through every day use, installing and uninstalling software leaves debris that make everything run a bit slower. Files can

More information

SPHOL207: Database Snapshots with SharePoint 2013

SPHOL207: Database Snapshots with SharePoint 2013 2013 SPHOL207: Database Snapshots with SharePoint 2013 Hands-On Lab Lab Manual This document is provided as-is. Information and views expressed in this document, including URL and other Internet Web site

More information

OpenEMR: Achieving DICOM Interoperability using Mirth

OpenEMR: Achieving DICOM Interoperability using Mirth OpenEMR: Achieving DICOM Interoperability using Mirth A ViSolve, Inc. Technical Guide TABLE OF CONTENTS Table of Contents 1. Objective... 3 2. DICOM Images... 3 3. DICOM Image Viewers... 4 4. Sending and

More information

Cloud Hosted Data in Digital Forensics

Cloud Hosted Data in Digital Forensics Cloud Hosted Data in Digital Forensics Session overview What is cloud storage? Do we need to worry about it? Collection considerations Forensic artefacts from: Google Drive Office 365/OneDrive Forensic

More information

A Visualization System and Monitoring Tool to Measure Concurrency in MPICH Programs

A Visualization System and Monitoring Tool to Measure Concurrency in MPICH Programs A Visualization System and Monitoring Tool to Measure Concurrency in MPICH Programs Michael Scherger Department of Computer Science Texas Christian University Email: [email protected] Zakir Hussain Syed

More information

How to Configure and Use SQL with EnCase Products

How to Configure and Use SQL with EnCase Products How to Configure and Use SQL with EnCase Products www.ceicconference.com Introduction Databases for Guidance Software Enterprise Products: EnCase ediscovery EnCase CyberSecurity Best Practice for EnCase

More information

Librarian. Integrating Secure Workflow and Revision Control into Your Production Environment WHITE PAPER

Librarian. Integrating Secure Workflow and Revision Control into Your Production Environment WHITE PAPER Librarian Integrating Secure Workflow and Revision Control into Your Production Environment WHITE PAPER Contents Overview 3 File Storage and Management 4 The Library 4 Folders, Files and File History 4

More information

Virtual CodeMeter Activation Guide

Virtual CodeMeter Activation Guide Virtual CodeMeter Activation Guide Introduction A Virtual CodeMeter (VCM) allows the user to run licensed AccessData products without a physical CodeMeter device. A VCM can be created using AccessData

More information

UFORIA - A FLEXIBLE VISUALISATION PLATFORM FOR DIGITAL FORENSICS AND E-DISCOVERY

UFORIA - A FLEXIBLE VISUALISATION PLATFORM FOR DIGITAL FORENSICS AND E-DISCOVERY UFORIA - A FLEXIBLE VISUALISATION PLATFORM FOR DIGITAL FORENSICS AND E-DISCOVERY Arnim Eijkhoudt & Sijmen Vos Amsterdam University of Applied Sciences Amsterdam, The Netherlands [email protected], [email protected]

More information

COMPUTER FORENSICS (EFFECTIVE 2013-14) ACTIVITY/COURSE CODE: 5374 (COURSE WILL BE LISTED IN THE 2013-14 CATE STUDENT REPORTING PROCEDURES MANUAL)

COMPUTER FORENSICS (EFFECTIVE 2013-14) ACTIVITY/COURSE CODE: 5374 (COURSE WILL BE LISTED IN THE 2013-14 CATE STUDENT REPORTING PROCEDURES MANUAL) COMPUTER FORENSICS (EFFECTIVE 2013-14) ACTIVITY/COURSE CODE: 5374 (COURSE WILL BE LISTED IN THE 2013-14 CATE STUDENT REPORTING PROCEDURES MANUAL) COURSE DESCRIPTION: Computer Forensics is focused on teaching

More information

Paper 064-2014. Robert Bonham, Gregory A. Smith, SAS Institute Inc., Cary NC

Paper 064-2014. Robert Bonham, Gregory A. Smith, SAS Institute Inc., Cary NC Paper 064-2014 Log entries, Events, Performance Measures, and SLAs: Understanding and Managing your SAS Deployment by Leveraging the SAS Environment Manager Data Mart ABSTRACT Robert Bonham, Gregory A.

More information

Impact of Digital Forensics Training on Computer Incident Response Techniques

Impact of Digital Forensics Training on Computer Incident Response Techniques Impact of Digital Forensics Training on Computer Incident Response Techniques Valorie J. King, PhD Collegiate Associate Professor University of Maryland University College Presentation to AFCEA June 25,

More information

Pcounter Web Report 3.x Installation Guide - v2014-11-30. Pcounter Web Report Installation Guide Version 3.4

Pcounter Web Report 3.x Installation Guide - v2014-11-30. Pcounter Web Report Installation Guide Version 3.4 Pcounter Web Report 3.x Installation Guide - v2014-11-30 Pcounter Web Report Installation Guide Version 3.4 Table of Contents Table of Contents... 2 Installation Overview... 3 Installation Prerequisites

More information

State of Michigan Data Exchange Gateway. Web-Interface Users Guide 12-07-2009

State of Michigan Data Exchange Gateway. Web-Interface Users Guide 12-07-2009 State of Michigan Data Exchange Gateway Web-Interface Users Guide 12-07-2009 Page 1 of 21 Revision History: Revision # Date Author Change: 1 8-14-2009 Mattingly Original Release 1.1 8-31-2009 MM Pgs 4,

More information

State of the art of Digital Forensic Techniques

State of the art of Digital Forensic Techniques State of the art of Digital Forensic Techniques Enos K. Mabuto 1, H. S Venter 2 Department of Computer Science University of Pretoria, Pretoria, 0002, South Africa Tel: +27 12 420 3654 Email: [email protected]

More information

Cloud Forensics. 175 Lakeside Ave, Room 300A Phone: 802/865-5744 Fax: 802/865-6446 http://www.lcdi.champlin.edu

Cloud Forensics. 175 Lakeside Ave, Room 300A Phone: 802/865-5744 Fax: 802/865-6446 http://www.lcdi.champlin.edu Cloud Forensics Written & Researched by: Maegan Katz & Ryan Montelbano 175 Lakeside Ave, Room 300A Phone: 802/865-5744 Fax: 802/865-6446 http://www.lcdi.champlin.edu November 4, 2013 Disclaimer: This document

More information

CSN08101 Digital Forensics Lecture 10: Windows Registry. Module Leader: Dr Gordon Russell Lecturers: Robert Ludwiniak

CSN08101 Digital Forensics Lecture 10: Windows Registry. Module Leader: Dr Gordon Russell Lecturers: Robert Ludwiniak CSN08101 Digital Forensics Lecture 10: Windows Registry Module Leader: Dr Gordon Russell Lecturers: Robert Ludwiniak Lecture Objectives Windows Registry Structure Properties Examples Timeline Analysis

More information

An Overview of the Jumplist Configuration File in Windows 7

An Overview of the Jumplist Configuration File in Windows 7 An Overview of the Jumplist Configuration File in Windows 7 Harjinder Singh Lalli University of Warwick, International Digital Laboratory (WMG), University of Warwick, Coventry, CV4 7AL, UK; [email protected]

More information

Programming IoT Gateways With macchina.io

Programming IoT Gateways With macchina.io Programming IoT Gateways With macchina.io Günter Obiltschnig Applied Informatics Software Engineering GmbH Maria Elend 143 9182 Maria Elend Austria [email protected] This article shows how

More information

What s New in Security

What s New in Security System Frameworks #WWDC16 What s New in Security Session 706 Lucia Ballard Secure Transports Engineering Manager Simon Cooper Trusted Execution Engineering Manager 2016 Apple Inc. All rights reserved.

More information

Digital Forensic analysis of malware infected machine Case study ***

Digital Forensic analysis of malware infected machine Case study *** Abstract Digital Forensic analysis of malware infected machine Case study Amulya Podile, Keerthi G & Krishna Sastry Pendyala# Incident Response & Malware Analysis Unit, Digital Forensics CoE, Tata Consultancy

More information

C HFI C HFI. EC-Council. EC-Council. Computer Hacking Forensic Investigator. Computer. Computer. Hacking Forensic INVESTIGATOR

C HFI C HFI. EC-Council. EC-Council. Computer Hacking Forensic Investigator. Computer. Computer. Hacking Forensic INVESTIGATOR 1 TM C HFI Computer C HFI Computer Hacking Forensic INVESTIGATOR Hacking Forensic INVESTIGATOR TM v8 v8 2 Be the leader. Deserve a place in the CHFI certified elite class. Earn cutting edge skills in computer

More information

Overview. Timeline Cloud Features and Technology

Overview. Timeline Cloud Features and Technology Overview Timeline Cloud is a backup software that creates continuous real time backups of your system and data to provide your company with a scalable, reliable and secure backup solution. Storage servers

More information

Concepts of digital forensics

Concepts of digital forensics Chapter 3 Concepts of digital forensics Digital forensics is a branch of forensic science concerned with the use of digital information (produced, stored and transmitted by computers) as source of evidence

More information

EnCase v7 Essential Training. Sherif Eldeeb https://eldeeb.net

EnCase v7 Essential Training. Sherif Eldeeb https://eldeeb.net هللامسب EnCase v7 Essential Training What s in this course Explore the most notable features of the new version. Everything you need to know about EnCase v7 to conduct basic investigations. Create Cases

More information

Discovery of Electronically Stored Information ECBA conference Tallinn October 2012

Discovery of Electronically Stored Information ECBA conference Tallinn October 2012 Discovery of Electronically Stored Information ECBA conference Tallinn October 2012 Jan Balatka, Deloitte Czech Republic, Analytic & Forensic Technology unit Agenda Introduction ediscovery investigation

More information

System Requirement Specification for A Distributed Desktop Search and Document Sharing Tool for Local Area Networks

System Requirement Specification for A Distributed Desktop Search and Document Sharing Tool for Local Area Networks System Requirement Specification for A Distributed Desktop Search and Document Sharing Tool for Local Area Networks OnurSoft Onur Tolga Şehitoğlu November 10, 2012 v1.0 Contents 1 Introduction 3 1.1 Purpose..............................

More information

Home Course Catalog Schedule Pricing & Savings Training Options Resources About Us

Home Course Catalog Schedule Pricing & Savings Training Options Resources About Us 1 of 14 12/04/2012 06:46 PM Hello, Jonathan Earl My Account Logout GS-35F-0556S CONTACT US Search TOLL FREE 877-932-8228 Home Course Catalog Schedule Pricing & Savings Training Options Resources About

More information