A collection of papers and how-to guides to assist with computer forensics on Windows, Linux, Unix, MacOS / OSX, iOS and Android operating systems. These papers may include free open-source tools, custom written applications by Network Defense Solutions, Inc. as well as professional tools such as FTK, EnCase as well as Autopsy / Sleuth Kit.
The main purpose of this document will be to combine both incident response and Linux forensics into one single article. Please keep in mind that the information presented in this segment will require intractions with the suspect machine. While we would prefer that analysts utilize the script here: https://networkdefensesolutions.com/index.php/products/58-desktop-services-linux/289-linuxir if you feel any other tools would work best for you. Please use those.
Extracting files, and or recovery of critical forensic information is key within the process of computer forensics. Out in the wild there are a plethora of tools that a forensic examiner may choose to utilize in order to do so. Although this does not directly relate to recovery of files from a forensic stand point, it can also be utilized for users who have lost data and want to try their hand at recovery of information. The focus of this document will be around Autopsy and how to use the free tool in order to recover said files.
Although stated in a previous writeup concerning computer forensics, it can be quite an expensive endeavor. Some of the things that you may come across whereby an expense is needed you may be able to get away with utilizing, Linux. When we discussed the need for write-blockers, it was said that you needed to purchase an expensive write-blocker that would allow you to make a disk image with ease of mind. However, you don't really need to do this. This article will explain how you can utilize Linux in order to pull a disk image and then feed it into ProDiscover and of course, bypass the need for a write blocker. This document will also detail how you can recover files that were deleted for a forensic investigation.
Recovering files with Forensic tools can be a great help when putting together a case, or even when you need to recover files that have been accidentally deleted. This paper will discuss how to utilize autopsy in order to recover, and pillage for files that have been deleted.
This document highlights some of the issues that forensic examiners face when dealing with encrypted files. Ideally, it will also point out how a forensic examiner may procure access to items that are encrypted with the use of a small browser trick which may be commonly overlooked by attackers. Although it's directed at the common person when engaging, it can also be applied to those who are not well versed with forensic obfuscation techniques. This focus herein will be centric around zip, browsers and other types of access.
Sometimes in computer forensics you will come across an issue where you may need to interact with the RAM within a computer. This example does not take the efforts into discussing an attack and the steps that you need to set up, but rather, it discusses tracking an event in memory. This is normally seen when a service, or application has been attacked. Once an exploit has been executed against the system, and if the attack is happening when the investigator is present – a forensic examiner may take the following steps as a sort of outline to assist.