Basic of Cyber forensic with tools and example

Gizmo
3 min readMay 2, 2023

--

Cyber forensic is the process of collecting, analyzing, and preserving digital evidence for use in legal proceedings or investigations. Cyber forensic tools are critical in this process, as they help investigators to retrieve and analyze data from digital devices such as computers, mobile phones, and servers. In this blog, we will explore some popular cyber forensic tools and how they are used in investigations.

Popular tools:

1. EnCase Forensic: A powerful and widely used tool for forensic analysis of digital devices such as computers, mobile phones, and servers. It can recover deleted files, analyze internet browsing history, and crack passwords to access encrypted data.

2. FTK Imager: A free forensic tool that is often used to create forensic images of digital devices. These images are used to preserve the state of the device at a specific point in time and can be analyzed later using other forensic tools. FTK Imager can also be used to recover deleted files, analyze file metadata, and search for specific keywords or phrases.

3. Volatility Framework: An open-source memory analysis tool used to analyze the RAM of a digital device. It can help investigators identify malicious processes, rootkits, and other types of malware.

4. Wireshark: A popular network protocol analyzer used to capture and analyze network traffic. It can identify and troubleshoot network issues, but it is also a powerful tool for cyber forensic investigations. Wireshark can capture packets from a network and analyze them to identify patterns of malicious activity.

5. Autopsy: An open-source digital forensic tool used to analyze digital devices. It is capable of recovering deleted files, analyzing file metadata, and performing keyword searches to identify relevant data.

6. Cellebrite UFED: A mobile device forensic tool used to extract data from mobile phones and other portable devices. It can recover deleted data, analyze user activity, and extract data from various sources such as SIM cards and cloud-based services.

7. X-Ways Forensics: A popular forensic tool used to analyze data from digital devices. It can recover deleted files, analyze file metadata, and search for specific keywords or phrases. X-Ways Forensics also has a built-in file viewer that allows investigators to view various types of files without the need for external software.

Case Study:

In 2017, the Equifax data breach occurred, in which hackers gained access to the personal data of approximately 143 million Americans. The breach was one of the largest in history and led to significant damage for the affected individuals.

The Equifax breach was investigated by a team of forensic experts who used tools such as EnCase Forensic and FTK Imager to analyze the digital evidence. They were able to trace the breach back to a vulnerability in the Apache Struts web application framework, which was not patched in a timely manner by Equifax.

The investigators also used Wireshark to capture network traffic and identify patterns of malicious activity. They found that the hackers used a combination of SQL injection and cross-site scripting (XSS) attacks to gain access to the Equifax network and steal the personal data of millions of individuals.

The forensic team also used Autopsy to analyze the hard drives of the affected servers and identify any evidence of the breach. They found that the hackers had been active on the network for several months before the breach was discovered, and had accessed sensitive data such as Social Security numbers, birth dates, and addresses.

The digital evidence gathered by the forensic team was used in legal proceedings against Equifax, resulting in a settlement of over $700 million to compensate the affected individuals.

In conclusion, the Equifax data breach was a significant cybercrime that led to the exposure of millions of individuals’ personal data. The investigation into the breach utilized various cyber forensic tools such as EnCase Forensic, FTK Imager, Wireshark, and Autopsy, to identify the cause of the breach and gather evidence for use in legal proceedings. This case demonstrates the importance of cyber forensic tools in investigating cybercrimes and holding those responsible accountable for their actions.

Follow for more !! #gizmo

--

--

Gizmo

Survive without surveillance | Real time stuffs and remedial measures