04-OS and Multimedia Forensics
04-OS and Multimedia Forensics
04-OS and Multimedia Forensics
1
Windows Forensics Analysis
OPERATING SYSTEM MARKET SHARE
FROM OCTOBER 2019 TO SEPTEMBER 2020
100
90
87.67
80
70
60
50
40
30
20
10
9.42 2.34 0.42 0.14 0.01
0
Windows Mac OS Linux Chrome OS Unknown BSD
2
3
Searching for Evidence in Windows OS
4
Windows Forensics
• Windows Acquisition
• Windows Volatile Data Acquisition
• Windows Memory Acquisition and Analysis
• Windows File Systems and Registry
• Windows FAT File Systems
• Windows NTFS File System
• Windows Registry
• Windows Forensics Analysis
• Forensics Analysis Preparation
• Windows Artifacts
• Forensic Analysis Tools for Windows
5
Windows Volatile Data Acquisition
• Investigations in Windows involves:
• Acquiring the evidence
• Preserving the evidence
• Analyzing the evidence
• Reporting the evidence
6
Memory
• Volatile sources - can only be recovered while a system is powered
on.
• What kinds of evidence can you obtain from memory?
• Running processes and the system objects/resources with which they interact
• Active network connections
• Loaded drivers
• User credentials (which may be hashed, obfuscated, or even appear in clear text)
• Portions of non-volatile sources of evidence such as the registry, event log, and
Master File Table
• Remnants of previously executed console commands
• Remnants of clear-text data that is otherwise encrypted on disk
• Important data structures within the kernel that provide insight into process
accounting, behavior, and execution
7
Collect Volatile Data from Windows
• System information
• Processes information
• Network information
• Logged on users
• Clipboard contents
• Command history – doskey / history
• MACTime
8
Evidence in Memory
• Can provide the investigator
with a snapshot of volatile
memory
Pagefile.sys Hiberfil.sys Swapfile.sys
9
Evidence in Memory (cont.)
• Pagefile - Pagefile.sys
• A key component of memory architecture in most modern OS
• Data within its virtual memory space may reside in non-contiguous
regions throughout the Pagefile or physical memory
10
Evidence in Memory (cont.)
• Hibernation Files - Hiberfil.sys
• Used by Windows to support the hibernation feature.
• Save the full contents of physical memory to a file on disk, and
powering-down the system.
• Upon powering up, Windows reads the contents of the hibernation
file and writes it back to memory, resulting in a restored and intact
user session.
11
Evidence in Memory (cont.)
• Swap file - Swapfile.sys
• A space on a hard disk used as the virtual memory extension of a
computer’s real memory (RAM).
• The least recently used files in RAM can be swapped out to the hard
disk until they are needed later so that new files can be swapped in
to RAM.
12
Evidence in Memory (cont.)
• Crash Dumps
• Serve as a sort of black box to help developers debug and
troubleshoot the conditions that led to the crash.
• 5 types of memory dumps in Windows 10:
1. Small memory dump (256 KB)
2. Kernel memory dump
3. Complete memory dump
4. Automatic memory dump (default option)
5. Active memory dump
13
Commands to Collect Volatile Data from
Windows
Tools Details
date /T; time /T System date and time
uptime When was the system rebooted
psinfo System information
ipconfig Network interface running in promiscuous mode
tasklist /svc; Look for unusual processes and services
psservices;
pslist
listdlls Currently loaded dlls
process explorer
psfile; openfiles View open files
netstat; fport Network connections
psloggedon; Logged in users
logonsessions
pclip View clipboard contents
Windows Event Viewer Logs
14
Memory Acquisition Tools
• Host-based
• winen.exe from Guidance Software
• MemoryDD from Mantech
• FTK Imager from Access Data
• Belkasoft Live RAM Capturer https://belkasoft.com/ram-capturer
• Remote
• F-Response by Agile Risk Management LLC
• FTK from Access Data
15
The Volatility Framework
• The open source framework for memory forensics and digital
investigations.
• Support for all flavours of Linux, Windows, MacOS and Android.
• Can analyse raw memory dumps, crash dumps, virtual machine
snapshots, VMware dumps, Microsoft crash dumps, hibernation files,
virtual box dumps, and many others.
• https://www.volatilityfoundation.org/
• https://github.com/volatilityfoundation/volatility/wiki
• A Python based toolkit can extract information from both Windows and
Linux/Unix memory images
• imageinfo, pslist, psscan, thrdscan, dlllist, modules, sockets, sockscan,
connections, connscan, hivelist, malfind
• vol.py –f memfile imageinfo
• vol.py –profile=WinXPSP3x86 connscan –f memfile
16
Tool: Volatility Framework (cont.)
17
Other Volatility Plugins
• Cryptoscan
• Based on “RAM IS KEY: EXTRACTING DISK ENCRYPTION KEYS FROM
VOLATILITY MEMORY” by Brian Kaplan
• https://cryptome.org/0003/RAMisKey.pdf
• Scans a memory image to recover truecrypt passphrases
• vol.py –profile= WinXPSP3x86 cryptoscan –f memfile
• Suspicious
• Displays the command line used in “suspicious” processes
• hivelist and hivescan
• Finds hive offsets in memory images
18
Google Rapid Response (GRR)
• GRR – GRR Framework
• https://grr-doc.readthedocs.io/en/latest/
• https://github.com/google/grr-doc
• An incident response framework, uses a client server architecture
• Focus on remote live forensics
• Client: Python agent for Linux, OS X and Windows
• Server: Ubuntu server 14.04 64 bit
19
Windows Forensics
• Windows Acquisition
• Windows Volatile Data Acquisition
• Windows Memory Acquisition and Analysis
• Windows File Systems and Registry
• Windows FAT File Systems
• Windows NTFS File System
• Windows Registry
• Windows Forensics Analysis
• Forensics Analysis Preparation
• Windows Artifacts
• Forensic Analysis Tools for Windows
20
File Systems
• File system is the place where you will find the “fingerprints”
of the parties that have used the system.
• Function: To effectively manage the available storage space
and index the files for more efficient access for the OS.
• Forensics Goal: To collect that data along with associated
metadata to prove intent.
21
Basic Concepts in Windows
• Clusters
• The basic storage unite of a disk
• The piece of storage that an OS can actually place data into
• Different disk formats have different cluster sizes
• Slack Space
• If they are not filled up which, the last one almost never is – this
excess capacity in the last cluster
22
File System – Space Management
• Cluster
• Computer stores data in a cluster.
• Cluster is like a container that contains data.
• 1 cluster = 4 sectors
23
File System – Space Management (cont.)
• Allocated cluster
• Allocated cluster is the cluster that is flagged as not available by the
Operating System.
• Simply put; that cluster contains active data.
24
File System – Space Management (cont.)
• Unallocated cluster
• Unallocated cluster is the cluster that is flagged as available by the
Operating System.
• The cluster may still contains data from previous deleted files.
25
File System – Space Management (cont.)
• Slack space
• Slack space is a cluster (or a portion of cluster) that is not being used
by the current data
• May contain no data at all, or data from previous deleted file
26
File System – Space Management (cont.)
27
Windows Directory Structure
28
What does a File System Do?
• Make a structure for an
OS to store files • File Allocation Table (FAT)
• FAT 12
• For users to access them • FAT 16
by name, location, date, • FAT 32
or other characteristics • exFAT
• File System Format: • NTFS, a file system for Windows NT/2K
• The process of turning a • NTFS4
partition into a • NTFS5
recognizable file system
29
FAT
• File Allocation Table - most widely used file system within Windows
• Default format used by media such as USB drives
• FAT File System Structure:
• The boot record
• The File Allocation Tables (FAT)
• The root directory
• The data area
• Limitations:
• Maximum file sizes
• Doesn’t support alternate streams
• No native encryption mechanism
30
Boot Record
• The first sector of a FAT 12 or FAT16 volume
• The first 3 sectors of a FAT32 volume
• Defines the volume, the offset of the other three areas
• Contains boot program if it is bootable
31
File Allocation Table
• A lookup table to see which cluster comes next
• File Allocation Table for FAT 16
• One entry is 16 bits representing one cluster
• Each entry can be:
• The cluster contains defective sectors
• The address of the next cluster in the same file
• A special value for “not allocated”
• A special value for “this is the last cluster in the chain”
32
How to Locate a File
• A directory entry that contains the file
• Find the first cluster in the directory (root or subdirectory)
• Find the chain of clusters that contain the data
33
File Deletion and Recovery under FAT
• Does not entirely remove the contents of that file from the
disk
• The system replaces the first character of the file name with
the hex byte code “E5h”
• Unallocate the clusters in FAT table
• Recover Folders in FAT Partition
• Searches through the unallocated clusters that had “.” and “..”
• Their directory entries were overwritten in the parent directory
34
System Format
35
NTFS
• New Technology File System - much more widely used on
modern Windows operating systems these days.
• More stable and secure, and performs at greater speeds than
the FAT file system.
• NTFS is not as compatible with other operating systems as the
FAT file system is.
• Supports all sizes of clusters from 512 bytes up to 64 Kbytes
• Represents character strings in 16-bit Unicode
• Use 64 bits for addressing the clusters
• Master File Table
36
NTFS Volume Boot Sector
• Begins in the first sector of the partition, can use up to 16
sectors
• Contains:
• Information of volume label and size, the location of the key
metadata files
• Program code to load the OS
37
Master File Table
• A system file created during the formatting of NTFS volume
• Record every files & directories on the volume, including an
entry for itself
• Record 16 system files
• Each file record store attributes
• $File Record Head (first 42 bytes) – MFT number, sequence no, link
count, file type, size, etc.
• $STANDARD_INFORMATION – MAC time, file characteristics (hidden,
system, …)
• $FILENAME - Up to 255 characters
• $DATA or associated cluster addresses
38
Master File Table (cont.)
• Each directory stores:
• Index entries for each file in the folder
• File name, standard_information
• Directory content
• $INDEX_ROOT – contains the index entries
• $INDEX_ALLOCATION (when cannot fit)
• The addition data are stored in index buffers
• $INDEX_ALLOCATION stores index buffers’ locations
39
Metafiles What is happening when you create a file on NTFS volume?
• The $BITMAP file may be modified
• An allocated MFT record must be created for the file
• $MFT • An index entry must be created for the file name in the parent
• $MFTMIRR folder’s MFT record or index buffers
• Cluster extent entries must be created in the file’s MFT record if
• $LOGFILE the file is not contained within MFT (non-resident)
• $VOLUME
• $ATTRDEF
• $BITMAP What is happening when you delete a file on NTFS volume?
• $BOOT • Its cluster references in the $BITMAP file are changed to zero
• $BADCLUS • The MFT record for that file is marked for deletion
• Its index entry is deleted
• $SECURE • The entries below it are moved up, thereby overwriting the
• $UPCASE deleted entry
• $EXTEND • When creating a new record, NTFS overwrites deleted MFT
entries before creating new ones
40
Windows Registry
• Central hierarchical, configuration What can you possibly find from
database Registry Files?
• Operating system relies on it • Usernames and passwords for
programs, e-mail and Internet sites
• Contains information about: • A history of Internet sites accessed,
• Hardware including plug and play devices including date and time
• Users information, preferences • A record of Internet searches via
• Support multiple users Google, Yahoo, etc.
• List of recently accessed files
• Application information
• A list of programs installed on the
• Network information system
• Type “regedit” in the Windows Search.
41
Windows Registry Structure
• Structured in a
tree format, where
each node in the
tree is called a key.
Key
• A key can contain
other keys
(subkeys) in
addition to data
values.
42
Windows Registry Structure (cont.)
Hive Name Contents
HKEY_CLASSES_ROOT Contains file association information (configuration
information that tells Windows which program to use
to open files).
HKEY_CURRENT_USER Stores configuration information (related to the
installed software and OS) to the currently logged-in
user.
HKEY_LOCAL_MACHINE Contains the majority of the configuration
information for currently installed programs and the
Windows OS itself.
HKEY_USERS Contains configuration information (user profiles) for
all active users on the system.
HKEY_CURRENT_CONFIG Does not store information itself; instead, acts as a
pointer to another registry key
(HKEY_LOCAL_MACHINE\System\CurrentControlSet\
Hardware Profiles\Current).
43
• Contains user account information for users and groups
SAM on the system
• Also contains hashed logon passwords
• Use of SAM
• Resolves user to SID
• Find out who is the last one logged in
• The last four characters in SID, also known as relative ID, or RID,
identifies specific users in the SAM file
• Identifying last logon using RID
• Windows stores the last logon time for a user
• Finding usernames from RID
• Determine last logon time for the RID
44
SYSTEM • Determine which control is active
• Find out time zone, mounted device
• Computer Name
• Device drivers and driver letter mappings
• The last known good configuration
• Setup information
• Hardware profile
• Finding USB last insertion and removal time
• USBSTOR under \Control\Set00x\Enum\USBTOR
45
Windows Event Log and USB Device
Tracking
• Identify the connection and disconnection events associated
with the device
• EventID 2003 associated with USB connected
• EventID 2100 / 2102, associated with USB disconnected
• https://www.techrepublic.com/article/how-to-track-down-
usb-flash-drive-usage-in-windows-10s-event-viewer/
46
SOFTWARE
• Contains a list of all installed programs and their settings
• Paths to application files and dirs.
• Use of SOFTWARE
• RegisteredOwner
• RegisteredOrganization
• ProductID
• ProductName
• InstallDate
47
Windows Registry Analysis (cont.)
• Digital forensic investigators can examine the Windows
registry using two methods:
The registry is contained
Live analysis
within a forensic image
• In this way, the computer • In this method, you can
forensic program will be access the registry as you
used to investigate do with any computer
registry files as you do using the Windows built-
when browsing in registry editor
files/folders using • e.g., when booting up
Windows File Explorer. from the suspect forensic
image
48
Windows Registry Analysis (cont.)
49
Acquiring Windows Registry
• We can use computer forensics tools to acquire Windows
registry files.
• We can also extract only the registry files from a live system
and store it separately for later analysis (referred as “Registry
Image”).
• Tool: AccessData FTK Imager
50
Tool: AccessData FTK Imager
1. Download AccessData FTK Imager and
install it into your USB thumb drive
2. Attach the USB drive that contains FTK
Imager to the suspect machine, open FTK
Image, and go to File menu ➤ Obtain
Protected Files
3. A new dialog appears; select where you
want to store obtained files, and check
the option “Password recovery and all
registry files”. Click the “OK” button.
4. A progress window will appear showing
registry files’ export progress
5. Upon finishing, the window will disappear
6. Go to the directory where you have saved
your registry files to see the results
51
Registry Examination
a) Automatic Startup Locations
b) Installed Program Keys in the Windows Registry
c) USB Device Forensics
d) Most Recently Used List
e) Network Analysis
f) Windows Shutdown Time
52
a) Automatic Startup Locations
• Some applications like antivirus software must run first to stop
any malicious software before Windows gets booted
completely
• Malicious software like keyloggers and botnets can add entries
to the Windows registry in order to launch automatically with
each Windows boot
53
List of autobooted programs can be
found in the registry keys
No Registry Key
1. HKEY_LOCAL_MACHINE\System\CurrentControlSet\Services
2. HKEY_LOCAL_MACHINE\Software\Microsoft\Windows\CurrentVersion\Explorer\ShellServ
iceObjects
3. HKEY_LOCAL_MACHINE\Software\Microsoft\Windows\CurrentVersion\RunServicesOnce
4. HKEY_LOCAL_MACHINE\Software\Microsoft\Windows\CurrentVersion\RunOnce
5. HKEY_LOCAL_MACHINE\Software\Microsoft\Windows\CurrentVersion\Policies\Explorer\
Run
6. HKEY_LOCAL_MACHINE\Software\Microsoft\Windows\CurrentVersion\Run
7. HKEY_LOCAL_MACHINE\Software\Microsoft\Windows NT\CurrentVersion\Windows
8. HKEY_LOCAL_MACHINE\Software\Microsoft\Windows\CurrentVersion\ShellServiceObjec
tDelayLoad
9. HKEY_LOCAL_MACHINE\Software\Microsoft\Windows\CurrentVersion\Explorer\
SharedTaskScheduler
10. HKEY_LOCAL_MACHINE\Software\Microsoft\Active Setup\Installed Components
54
List of autobooted programs can be found in the
registry keys (cont.)
No Registry Key
11. HKEY_LOCAL_MACHINE\Wow6432Node\Microsoft\Active Setup\Installed Components
12. HKEY_LOCAL_MACHINE\Software\Microsoft\Windows\CurrentVersion\Explorer\
SharedTaskScheduler
13. HKEY_LOCAL_MACHINE\Software\Microsoft\Windows NT\CurrentVersion\Drivers32
14. HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\RunOnce
15. HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Run
16. HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Policies\Explorer
\Run
17. HKEY_CURRENT_USER\Software\Microsoft\Windows NT\CurrentVersion\Windows\load
18. HKEY_CURRENT_USER\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\
Run (64 bit systems only)
19. HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\RunServices
20. HKEY_CURRENT_USER\
Software\Microsoft\Windows\CurrentVersion\RunServicesOnce
21. HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\RunOnceEx
55
Tool: Autoruns for Windows v13.96
• Autoruns: Portable utility to investigate all autorun programs
• This tool can be downloaded from
https://docs.microsoft.com/en-
us/sysinternals/downloads/autoruns
56
b) Installed Program Keys in the Windows
Registry
• Windows keeps records of all installed applications in the following
locations in the registry.
• Table below lists the Registry Keys That Hold Information About
Installed Programs (Current and Previous Leftover)
No Registry Key
1. HKEY_LOCAL_MACHINE\SOFTWARE\MICROSOFT\WINDOWS\CURRENTVERSION\UNINSTALL
2. HKEY_CURRENT_USER\SOFTWARE\MICROSOFT\WINDOWS\CURRENTVERSION\
UNINSTALL *
3. HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432NODE\MICROSOFT\WINDOWS\
CURRENTVERSION\UNINSTALL \**
4. HKEY _ CLASSES_ROOT \INSTALL ER\PRODUCTS\<PRODUCT CODE>\SOURCELIST\NET
5. HKEY_CURRENT_USER\SOFTWARE\MICROSOFT\INSTALL ER\PRODUCTS\<PRODUCT
CODE>\SOURCELIST\NET
*If the suspect’s machine has more than one user, each user will have his/her own set of
software installed on his/her own key under the (HKEY_CURRENT_USER) hive.
**For Windows X64 version.
57
Tool: RegScanner
• Nirsoft offers a free tool
called RegScanner
(www.nirsoft.net/utils/regsc
anner.html)
• A tool used to search the
Windows registry according
to specific search criteria
entered by the user
58
Tool: RegScanner (cont.)
• In the returned results, user can click any item in this list to go to
the associated value in RegEdit.
• Can export the found registry values into a .reg file.
59
c) USB Device Forensics
• Windows registry also stores important technical information for each
connected USB device such as vendor ID, product ID, revision, and serial
number
• E.g.: HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\ Enum\USBSTOR
Key Location
Serial
Number
60
c) USB Device Forensics (cont.)
Product
ID
Vendor
ID
61
c) USB Device Forensics (cont.)
• E.g.:
HKEY_LOCAL_MACHINE\SYSTEM\MountedDevices
62
Tool: USBDeview
• Automate the process of finding information about the current
and previous USB connected devices.
• USBDeview doesn't require any installation process or
additional DLL files. Just run the executable file.
• https://www.nirsoft.net/utils/usb_devices_view.html
63
Tool: USBDeview (cont.)
64
Tool: USBDetective
• Processes USB device artifacts from Windows XP through
Windows 10.
• Support for live system, individual files/folders, and logical
drive processing.
• Need to upgrade to the professional paid version to use all
features.
• https://usbdetective.com
65
Tool: USB Forensic Tracker (USBFT)
• Extracts USB device connection artifacts from a range of locations within
the live system, from mounted forensic images, from volume shadow
copies.
• Extracted Windows system files and from both extracted Mac OSX and
Linux system files.
http://www.orionforensics.co
m/forensics-tools/usb-forensic-
tracker/
66
d) Most Recently Used List
• Many applications that run on Windows that have most recently
used (MRU) lists
• E.g.: Recently opened MS Office files, recently visited web pages
• Table below shows Common Windows Registry History List Keys:
Windows 10
No Registry Key
1. HKEY_CURRENT_USER\Software\Microsoft\Internet Explorer\TypedURLs
2. HKEY_CURRENT_USER\Software\Microsoft\Office\16.0\Word*\User MRU\LiveId__\File MRU
3. HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Explorer\ComDlg32\OpenSavePidl
MRU
4. HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Explorer\ComDlg32\LastVisitedPid
lMRU
5. HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Explorer\RunMRU
6. HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Explorer\RecentDocs
7. HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Applets\Regedit
68
Other Tools to View Most Recently Used List
• ExecutedProgramsList
• List of programs and batch files
that have executed previously on
the target machine
• https://www.nirsoft.net/utils/
executed_programs_list.html
• OpenSaveFilesView
• List of files that have been previously
opened on the target machine using
the standard open/save dialog box of
Windows
• http://www.nirsoft.net/utils/open_s
ave_files_view.html
69
e) Network Analysis
• Registry lists all network cards that have been used, reveal the
wireless connection profile (name, IP address, subnet mask, DHCP).
• Date the connection was first created and the last date the
connection took place.
• Table below shows Common Windows Registry Keys for Storing
Network Connections
No Registry Key
1. HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\NetworkCards
2. HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\WindowsNT\CurrentVersion\NetworkList\Nla\Cache\Intra
net
3. HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\NetworkList\Nla\Wireless
4. HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\WindowsNT\CurrentVersion\NetworkList\
Signatures\Unmanaged
5. HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\NetworkList\Profiles
70
Revealing wireless connection (access point)
network properties
Wireless
connection details
71
f) Windows Shutdown Time
• Windows registry records when the system was last closed
down in the following registry key:
• HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Control\Windows
• The shutdown
value is stored
using a binary
value
72
Tool: DCode
• To decode it to a readable
form, use a tool called
DCode from Digital
Detective
• www.digital-
detective.net/dcode
Time decoded
into a readable
format
73
Windows Forensics
• Windows Acquisition
• Windows Volatile Data Acquisition
• Windows Memory Acquisition and Analysis
• Windows File Systems and Registry
• Windows FAT File Systems
• Windows NTFS File System
• Windows Registry
• Windows Forensics Analysis
• Forensics Analysis Preparation
• Windows Artifacts
• Forensic Analysis Tools for Windows
74
Forensics Analysis Preparation
• Set time zone
• Start an analysis by looking at the partition table on the suspect
drive
• Retrieve deleted files
• Use data carving technologies to recover hidden data
• Create and examine MAC (modified, created, accessed) times
• Keyword search for terms related to your case
• Check for emails, pictures, Internet data
• Obtain evidence from registry, recycle bi, shortcuts, event logs,
etc.
75
Data/File Carving
• When a file is only partially recovered, regardless of the file
system, we can use file carving to attempt to recover the file
• File carving:
• Often used to recover data from a disk where there has been some
damage or where the file itself is corrupt
• Common method of data recovery when the file metadata has been
damaged
• To extract the data from a single file from the larger set of data
• Most often used to recover files from the unallocated space in a drive
• Reconstructing file fragments by scanning the raw bytes of the disk
and reassembling them - examining the header (the first few bytes)
and footer (the last few bytes) of a file
76
Forensics Analysis Preparation
• Set time zone
• Start an analysis by looking at the partition table on the suspect
drive
• Retrieve deleted files
• Use data carving technologies to recover hidden data
• Create and examine MAC (modified, created, accessed) times
• Keyword search for terms related to your case
• Check for emails, pictures, Internet data
• Obtain evidence from registry, recycle bi, shortcuts, event logs,
etc.
77
MAC Times
• Windows records the data • Linux records the data and
and time of a file: time of a file:
• Creation (Created) • Change/ctime (Last time the
• Last Modification (Modified) file’s inode was changed)
• The date that a file was last • Modification/mtime (Last
accessed (Accessed) time the file was written)
• Access / atime (Last time the
file was read)
78
Timeline Analysis
• Holistic view about the succession of events that have happened to
the system.
• Allows investigators to save their investigation time by reducing the
volume of data that needs to be investigated to a specific
timeframe
• Allows investigators to segregate evidence and arrange it
accordingly
• Used to cross-check other aspects of the investigations
• Helps the investigators to re-create the events of the crime and
trace back the steps of suspect/victim
• Expert hackers/criminals alter the data in their computer to alter
the timeline and throw the forensic investigators off track
79
Tool: Autopsy
• To generate a timeline of events for your case using
Autopsy, follow these steps:
1. Launch Autopsy and create a new case.
2. Load image file, Ch04.dd
3. Go to the Tools menu ➤ Timeline.
4. Autopsy will need some time (depending on the supplied
forensic image size) to populate the data for the
timeline.
80
Creating a Timeline Using Autopsy
(cont.)
4. After finishing timeline data population, Autopsy can present data
using three view modes: Bar chart, Detail mode, List mode
Counts
81
Creating a Timeline Using Autopsy (cont.)
Details
Lists
82
Timeline analysis in detail mode using
Autopsy 1
3
Date of File Activity
4 5
84
Windows Recycle Bin Forensics
• Contains files that have been deleted by users but still exist
within the system.
• When a user deletes a file, Windows moves the subject file to
the recycle bin without deleting it permanently.
• Different versions of Windows have different recycle bin file
names and locations.
OS File System Recycle Bin Folder Location
Windows 95/98/ME FAT/FAT32 C:\RECYCLED\INFO2
Windows XP/NT/2000 NTFS C:\RECYCLER\%SID%\INFO
Windows Vista/7/8/10 NTFS C:\$Recycle.Bin\%SID%\
85
Example: Windows 10 Recycle Bin Forensics
• There are .docx and .png and .pdf files on the desktop.
• I delete them and then look at the contents of the recycle bin
and see those files that I just deleted.
86
Example: Windows 10 Recycle Bin Forensics (cont.)
87
Example: Windows 10 Recycle Bin Forensics (cont.)
• Enter into the folder, do dir /a again and then we see the
SID folders.
88
Example: Windows 10 Recycle Bin Forensics (cont.)
89
Example: Windows 10 Recycle Bin Forensics (cont.)
• cd S-1-5-21-3660784980-185845555-2208055020-1001
• dir /a
90
Example: Windows 10 Recycle Bin Forensics (cont.)
91
Example: Windows 10 Recycle Bin Forensics (cont.)
• For example, if I take $RU8IOLU.pdf file and copy it on to
D:\Forensics Lab\Ch 04 folder we will see that it is indeed the
original file that was deleted.
92
Example: Windows 10 Recycle Bin Forensics (cont.)
• We can see the original path and the file name that was
deleted as shown above.
93
Attributing an Action to Its Associated
User Account
• A suspect Windows PC can have more than one account.
• For each account on a Windows PC, there is a unique number
that distinguishes it called the SID.
• The MS-DOS command (wmic useraccount get name,sid)
can show us the available user accounts and their associated
SIDs of any Windows machine.
94
Web Browsing Activities
• Searching and examining
suspect web browsing activities
are a crucial step in forensic
investigation
• URLs that a user visited,
cookies and pages downloaded
and the time of access
https://www.sandiegouniontribune.com/sdut-chandra-
levy-computer-yields-data-on-park-condit-2010oct28-
story.html
95
Print
• Printing involves a spooling process
• The local print provider
• Writes the file’s content to a spool file (.spl) and creates a separate
graphics file (emf) for each page
• Tracks username, filename and data type in a shadow file (shd)
• Spooling protects a print job by saving it on disk
96
Print (cont.)
• For each print job, two files
are created
• .shd (shadow file) contains
information about the print
job
• The owner
• The printer
• The name of the file printed
• The fully qualified path
• The printing method (raw or
emf)
• .spl (spool file) contains file
contents with .emf pictures
97
Event Log Analysis
• Windows records important events (both hardware and
software events) that have happened to the system,
applications, or other services in what is called an event log.
• Recording events: low memory, failed login, etc.
98
Event Viewer using Windows 10 OS
• View logged events Event Viewer by going to Control Panel
➤ Administrative Tools ➤ Computer Management
99
Tool: FullEventLogView
• Displays all Windows event logs in one table
• View events stored on a local machine or a remote computer,
or examine an exported Windows log file
• An event list
can be
exported into
a TXT or HTML
file
• http://www.ni
rsoft.net/utils
/full_event_lo
g_view.html
100
Other Tools for Event Log Analysis
• Log parser
• Query Windows event log using the SQL query language
• www.microsoft.com/en-us/download/details.aspx?id=24659
• Log Parser Lizard GUI
• Query software tool; it uses SQL to query Windows event log, IIS log,
the registry, the file system, the active directory services, and more.
• www.lizard-labs.com/log_parser_lizard.aspx
101
Forensic Analysis Tools for Windows
Forensic Analysis
• Autopsy / Sleuthkit
• Encase
• FTK
• OSForensics
• ProDiscover
• Forensic Explorer
102
Forensic Analysis Tools in Common
Features include:
• Deleted files recovery including data
carving
• MAC times analysis
• Index search and live search
• Signature analysis
• Email analysis
• Hash analysis
• Graphics view
• Internet and website analysis
• Registry analysis, recycle bin,
shortcuts, and other Windows
artifacts analysis 103
Keyword Search
• Index search: data is indexed
prior to searching
• Raw/live search: searches
based on non-indexed, raw
data using regular expression
104
Bookmark / Tag
• Organize your analysis of a case in a
group of selected items
• Help to write reports
• How to create a bookmark
• Right-click and select Create Bookmark
105
Report Generation
• File Report Wizard
• Includes
• Case Information
• Bookmarks
• Flagged Graphics
• File Management
• Supplementary files
• Location
• Custom graphic for the report
106
Autopsy
• Forensics Workstation
• Operating System Used: Windows 10 Operating System with
Autopsy Tool
• Suspect’s Drive image
• Files are analyzed to identify evidence that either supports or
contradicts a hypothesis or for signs of tampering to hide data from
investigators
• Objectives:
• To analyze the evidence image
• To generate report
107
Recuva
• A recovery program for Windows that is
able to undelete files that have been
deleted
• Link:
https://www.ccleaner.com/recuva/download
• Objective: To recover deleted files from a
Windows system
• Steps:
1. Start the tool and select the type of files you
want to recover. (E.g.: All Files)
2. Choose the location from where you want to
recover files. (E.g. E drive)
3. You will see the list of deleted files
4. Select the files you want to ‘recover’ and
click on the Recover button
5. Give the location where you want to store
the recovered files (E.g.: Downloads folder)
108
109
Linux Distributions
Server or enterprise
Desktop distributions Live-CD distributions
distributions
• Include a graphical • Used primarily for • A bootable version
interface and business of an operating
common applications, but system that is
applications, can also be used as loaded directly into
suitable for home a home server. RAM and functions
use. outside and
independently of
the target
computer’s
operating system.
110
Linux System Files
System File Contents
/etc/exports File systems exported to remote hosts; might include remote
drive mappings
/etc/fstab File system table of devices and mount points
/var/log/lastlog User’s last logon
/var/log/wtmp Logon and logoff history information
/var/run/utmp Current user’s logon information
/var/log/dmesg System messages log
/var/log/syslog System log, occasionally called system.log or kernel.log
/etc/shadow Master password file, containing hashed passwords for the local
system
/etc/group Group memberships for the local system
/etc/passwd Account information for the local system
111
Core top-level directories of a Linux
system
Directory Details
/usr Most applications and commands are in this directory or its subdirectories bin
(stands for “binary” and contains binary files required at boot time) and sbin
(which requires superuser permission to run the binaries in it).
/root The home directory for the root user (superuser), which is kept separate from
other user home directories.
/dev Device files that act as stand-ins for the devices they represent. E.g. in Lab 3,
/dev/sda is the first non-IDE disk drive on the system, usually the main hard
drive.
/var Subdirectories such as log (often useful for investigations), mail
(storing e-mail accounts), and spool (where print jobs are spooled).
112
File Structures in Ext4
• Support for partitions larger than 16 TB
• Improved management of large files
• Flexible approach to adding file system features
• In UNIX and Linux,
everything is considered a • UNIX files are defined as
file objects
• Including disk drives, • Has properties and methods
monitors, tape drives, (actions such as writing,
network interface cards, deleting, and reading) that
system memory, and can be performed on it
directories
113
Components in Linux
A block is the smallest disk allocation unit in the UNIX/ Linux file
system and can be 512 bytes and up; block size depends on how the
disk volume is initiated.
119
Hard Link (cont.)
• ls –ia command: to view files and
their inode numbers
• Inside each inode a field called link
count that specifies the number of hard
links.
• If two files have the same inode number, the
link count is two.
• If one file is deleted, the link count drops by
one.
• When the hard link count drops to zero, the
file is effectively deleted.
• ls -a command: to see the contents of
a directory
• . (“dot”): refers to the directory • Every subdirectory has a dot-dot
reference: corresponding parent
• .. (“dot-dot”), refers to the parent directory directory
• Both dot and dot-dot count as links, so most • Each one adds to the parent
directories have at least two hard links.
directory’s link count.
120
Symbolic Link
• Also known as “soft links” or “symlinks”.
• Pointers to other files and aren’t included in the link count.
• Can point to items on other drives or other parts of the network.
• Have an inode of their own, which is NOT the same as the inode of
the item they’re pointing to.
• Depend on the continued existence of the destination they’re
pointing to.
• Easy to identify on a running Linux system.
• Identify their destination by name and path.
• If a name and path no longer exist, the symbolic link stops working.
• ln -s command: create symbolic links.
121
Linux Forensics
• Utilities for imaging and basic disk analysis include:
Utility Details
dd and dcfldd Copies data from an input file or device to an output file or
device
sfdisk and fdisk Determines the disk structure
grep Searches files for instances of an expression or pattern
md5sum and sha1sum Create and store an MD5 or SHA-1 hash of a file or list of
files
file Reads file header information in an attempt to ascertain its
type, regardless of name or extension
122
Advantages & Disadvantages of Linux in
Forensics
• Advantages: • Disadvantages:
• Software availability and • The investigator may need to be
accessibility specially trained to use Linux
• Efficiency • Because Linux is an open-source
• Optimization and customization operating system, it is
• Support frequently updated
123
Recognizing Partitions in Linux
• The device is usually /dev/sda, /dev/sdb or so on. A device
name refers to the entire disk, and the device name will be as
follows:
124
List Partitions Under Linux
• Type fdisk -l (lowercase L)
125
Hard Disk Analysis
• Steps:
• Make an image of the hard disk using dcfldd
• Use md5sum to collect information about the system time and date
• Mount the copy of the evidence into the file system
• Capture the drive’s forensics data
• Extract deleted inode (modification/access/change) times
• Combine evidence for timeline conversion
• Generate timeline
126
Data Collection
• Forensic Toolkit Preparation
• To find & collect any important data from a compromised system
• Toolkit is a pack of tools such as nc, dd datecate, pcat, dmesg and
others
• Investigator mounts the toolkit to a removable disk
• To avoid changing the compromised system’s metadata
127
Data Collection Using the Toolkit
Steps to collect data
1. Media mounting
• Mount the toolkit on the external media
• Calculate the hash value of the collected file
2. Collect the current date result, presented in UTC format
3. Cache tables
• Collect the MAC address cache table
• Collect the kernel route cache table
4. Collect information about current/pending connections and
open TCP/UDP ports
128
Data Collection Using the Toolkit (cont.)
130
Linux Digital Forensics Tools
GRR Rapid Response Remote live forensics for incident response
Mozilla InvestiGator Real-time digital forensics and investigation
platform
Radare2 Portable reversing framework
The Sleuth Kit Collection of tools for forensic analysis
Autopsy Forensic Browser Graphical interface to SleuthKit
Volatility Advanced memory forensics framework
guymager Forensic imaging tool
dcfldd Enhanced version of dd for forensics and security
rdd Forensic copy program
131
132
Multimedia Forensics
• Involves the set of techniques used for the analysis of
multimedia signals like audio, video, images
• Aims:
• Reveal the history of digital content.
• Identifying the acquisition device that produced the data.
• Validating the integrity of the contents.
• Retrieving information from multimedia signals.
• Basic branches of multimedia forensics:
• manipulation detection scenario
• identification scenario
133
E.g.: Image Forgery Detection
• Authenticity of digital images has an essential role
• Digital image forgery has been growing
• E.g.: Photo manipulation - used to deceive or persuade
viewers, or for improved storytelling
• Image forgery detection aims to verify the authenticity of a
digital image
134
Photo manipulation
• The mystery of
Myanmar’s
missing
umbrella
135
Photo manipulation (cont.)
A California lawyer is
facing license
suspension for
alleged deceptive
advertising by
Photoshopping
herself into cozy
pictures with
politicians and
celebrities on her
official website.
136
Image Authentication Approaches
Passive-blind image
Active image authentication
authentication
• Uses a known authentication • Identifies the copied region
code embedded into the image from the image’s pixels
content before the images are • Three categories:
sent through an unreliable • Image processing operation
public channel detection
• Verify the presence of such • Device-based image forgery
authentication code by detection
comparing with the original
• Format-based image forgery
inserted code
detection.
• E.g.: Digital signature &
watermarking
137
Active image authentication:
Digital Watermarking
• To hide a message
inside a digital
signal (e.g., an
audio, image, and
video) for various
purposes
138
Active image authentication :
Digital Signature
• To verify the authenticity
and integrity of a
document (e.g., an image)
• Digital signature is usually
implemented based on
public key cryptosystem,
such as RSA and ElGamal
139
Passive-blind image authentication :
Image Processing Operation Authentication
• Image processing operations that helps to identify the
forgeries:
Copy-Move Forgery Re-sampling
Blurring Detection
Detection (CMFD) Detection
The copied
regions may Identify blur
Check
range from inconsistencies
correlations in
background, in various image
image regions
object, creature regions
to letter
140
Copy-Move Detection
• Copying some regions in
the image and moving
the same to some other
region in the image
• In copy-move detection
post-processing
operation like blurring
is used to decrease the
effect of border
irregularities between
the two images
141
Blurring Detection
• Find the blurring,
enhancements, or
color changes and
illumination
changes in the
forged image
• Lighting
inconsistency in the
composite image
can be used for the
detection of image
tampering
142
Passive-blind image authentication :
Device-based Image Authentication
• Identifying the device used for its acquisition to determine
integrity and authenticity of a given image
144
Recognizing a Graphics File
• Graphics file is any picture or graphical depiction that has been
stored in digital format.
• It refers to photographs, drawings, or other graphics that don’t
include any motion or animation.
• A graphics program creates one of three types of graphics files:
bitmap, vector and metafile:
• Bitmap images: collection of dots or pixels, in a grid format that form a
graphic.
• Vector graphics: based on mathematical instructions that define lines,
curves, text, ovals, and other geometric shapes
• Metafile graphics: combination of bitmap and vector
• Two types of programs to work with graphics files:
• Graphics editors and image viewers
145
Common Terminologies
Pixel Bit Depth Resolution
147
Vector Images
• Generated from mathematical information stored in the
graphic, which instructs the program opening the image how
to display the position, width, length, direction.
• Preserve quality when image is enlarged
• Vector images are converted into raster graphics so that they
can be used on other systems.
• E.g. .ai (Illustrator), .psd (Photoshop)
148
Metafile Graphics
• Can contain a combination of bitmap/raster, vector, and can
have the characteristics of both file types.
• E.g.: Scanned photo (bitmap) with text (vector)
• Share the limitations of both:
• If you enlarge a metafile graphic, the area created with a bitmap
loses some resolution, but the vector-formatted area remains sharp
and clear.
149
Image File Formats
• File format is a particular way to encode information for
storage in a computer file.
• All images formats differ in their ease of use, the size of the
files they produce and their image quality.
Standard Image File Formats Non-Standard Image File Formats
File formats File extension File formats File extension
Joint Photographic Experts .jpg, .jpeg Targa .tga
Group (JPEG)
Raster Transfer Language .rtl
Graphics Interchange Format .gif
(GIF) Photoshop .psd
Tagged Image File Format .tif, .tiff
Illustrator .ai
(TIFF)
Bitmap .bmp Freehand .fh9
Portable Network Graphics .png Scalable Vector Graphics .svg
(PNG)
Paintbrush .pcx
150
Understanding Digital Photograph File
Formats
• Witnesses or suspects can create their own digital photos
• Examining the raw file format
• Raw file format or Exif format
• Referred to as a digital negative
• Typically found on many higher-end digital cameras
151
Understanding Digital Camera File
Formats (cont.)
• Examining the raw file format (cont.)
• Sensors in the digital camera simply record pixels on the camera’s
memory card
• Raw format maintains the best picture quality
• The biggest disadvantage is that it’s proprietary
• And not all image viewers can display these formats
• The process of converting raw picture data to another format is
referred to as demosaicing
152
Understanding Digital Camera File
Formats (cont.)
• Examining the Exchangeable Image File format
• Exchangeable Image File (EXIF) format
• Commonly used to store digital pictures
• When a digital photo is taken, information about the
device and settings are stored in the graphics file.
• GPS capability, latitude and longitude location data
might be recorded
153
Understanding Digital Camera File
Formats (cont.)
• Examining the Exchangeable Image File format
(cont.)
• EXIF format collects metadata
• Investigators can learn more about the type of digital camera and the
environment in which pictures were taken
• EXIF file stores metadata at the beginning of the file
• With tools such as Autopsy, ProDiscover, Exif Reader
• You can extract metadata as evidence for your case
154
Autopsy displaying metadata from an
Exif JPEG file
155
EXIFTOOL displaying metadata from
JPEG file
156
Data Compression
• Some image formats compress their data
• GIF, JPEG, PNG
• Others, like BMP, do not compress their data
• Use data compression tools for those formats
• Data compression
• Coding of data from a larger to a smaller form
• Types
• Lossless compression and lossy compression
157
Lossless and Lossy Compression
Lossless compression Lossy compression
158
Locating and Recovering Graphics Files
• Built-in tools in some OSs
• Time consuming
• Results are difficult to verify
• Computer forensics tools
160
Repairing Damaged Headers
• Use good header samples (known graphic file formats)
• Each image file has a unique file header
• JPEG: FF D8 FF E0 00 10
• Most JPEG files also include JFIF string
161
Rebuilding File Headers
• Try to open the file first and follow steps if you can’t see its
content
• Steps
1. Recover more pieces of file if needed
2. Examine file header
• Compare with a good header sample
• Manually insert correct hexadecimal values
3. Test corrected file
162
Reconstructing File Fragments
• Corrupted data
• Extract possible data fragments to reconstruct files for evidentiary purposes
• Steps
1. Locate and export all clusters of the fragmented file
2. Determine the starting and ending cluster numbers for each fragmented
group of clusters
3. Copy each fragmented group of clusters in their proper sequence to a
recovery file
4. Rebuild the corrupted file’s header to make it readable in a graphics
viewer
5. Remember to save the updated recovered data with a .jpg extension
163
Identifying Unknown File Formats
• The Internet is the best source
• Search engines like Google
• Find explanations and viewers
• Popular Web sites
• www.fileformat.info/format/all.htm
• http://extension.informer.com/
• www.martinreddy.net/gfx/
164
Analyzing Graphics File Headers
• Necessary when you find files your tools do not recognize
• Use hex editor such as WinHex
• Record hexadecimal values on header
• Use good header samples
165
Tools for Viewing Images
• Use several viewers
• ThumbsPlus
• ACDSee
• QuickView
• IrfanView
• GUI forensics tools include image viewers
• ProDiscover
• EnCase
• FTK
• X-Ways Forensics
• iLook
166
Steganography and Steganalysis
• Forensics investigators must understand
• the basis behind steganography
• steganography techniques
• the means by which an adversary can defeat against steganographic
systems (steganalysis)
• Steganography is a form of data hiding in which a message
is hidden within another file
• Data to be hidden is the carrier medium
• The file in which the data is hidden is the steganographic medium
• Both parties communicating via steganography must use the
same stega application
167
Steganography and Steganalysis (cont.)
• Steganography is difficult to detect; the following clues may
indicate stega use:
• Technical capabilities or sophistication of the computer’s owner
• Software clues on the computer
• Other program files that indicate familiarity with data-hiding
methods
• Multimedia files
• Type of crime being investigated
168
Steganography in Graphics Files
• Steganography hides information inside image files
• Ancient technique
• Can hide only certain amount of information
• Two major forms: Insertion and Substitution
• Insertion: places data from the secret file into the host file
• Hidden data is not displayed when viewing host file in its associated
program
• You need to analyze the data structure carefully
• Example: Web page
169
Steganography in Graphics Files (cont.)
• Substitution: replaces bits of the host file with bits of data
• Usually change the last two LSBs
• Detected with steganalysis tools
• Usually used with image files
• Audio and video options
• Hard to detect
170
Steganography in Graphics Files (cont.)
• Substitution (cont.)
• E.g.: 8-bit graphics file, each pixel is represented by 8 bits of data
• The bits are prioritized from left to right, such as 11101100.
• The first bit on the left is the most significant bit (MSB), and the last bit on the
right is the least significant bit (LSB).
171
Using Steganalysis Tools
• Detect variations of the graphic image
• When applied correctly you cannot detect hidden data in most cases
• Methods:
• Compare suspect file to good or bad image versions
• Mathematical calculations verify size and palette color
• Compare hash values
172
Identifying Copyright Issues with
Graphics
• Steganography originally incorporated watermarks
• By inserting digital watermarks into a file
• Digital forensics investigators need to be aware of copyright
laws
• Work closely with the legal department to guard against copyright
violations
• Determine whether a photo is from a known copyrighted
source
• Copyright laws for Internet are not clear
• There is no international copyright law
173
Best Practices for Forensic Graphics
Analysis
Document the current
Methods of acquiring evidence should
condition of the
be forensically sound and verifiable
evidence
Should be captured using
hardware/software that is
capable of capturing a bit
Prevent exposure to
stream image of the
evidence that may be
original media
contaminated with
dangerous substances or
Preserve
hazardous materials
integrity
175
Scenario 1
• A group of thieves stole a car with an dragon logo and used it in a
bank robbery.
• The license plate number could not be seen in the video of the
crime scene because of the viewing angle problem.
• Therefore, detectives used a rotation, scaling, and translation
invariant object detection algorithm (RST-invariant) to search for
the dragon logo in videos recorded by the CCTV mounted in the
neighborhood of the crime scene.
• If the detectives can identify the car in some of the video clips and
see the license plate number clearly, then the search time can be
reduced significantly.
176
Scenario 2
• A lady was robbed and the CCTV in the area recorded the whole
incident.
• However, the CCTV mounted at the actual location of the robbery only
captured a profile of the thief.
• Therefore, the police analyzed the posture of the suspect and compared
it with the posture of all pedestrians recorded by the CCTVs in the area.
• Then, the posture that were closest to the suspect’s posture formed a
candidate set.
• Since the search space could be reduced significantly by comparing the
subject’s posture, the police only needed to check the height of the
subjects, the color of their clothes, and other features to identify the
suspect.
• Of course, a frontal shot of the suspect’s face would be the ideal view.
177
Scenario 3
• The general manager of a high-tech company was killed on the fifth floor
of the company’s building.
• The suspect took the elevator to the first floor and was picked up by a
white van.
• The CCTV at the front door of the building captured an image of the side
of the van, but did not provide any clue about the license plate number.
• Detectives checked the CCTVs captured by neighboring camcorders and
found a good shot of the license plate, but the characters were blurred
due to the distance.
• The police contacted a famous image processing laboratory, which used a
systematic method to distinguish the license plate number.
• The police then used the license plate number to identify the owner of
the van and traced his/ her cellular phone record.
• Based on the communications between the suspect and the person who
gave instructions, the police were able to solve the crime.
178
Scenario 4
• In the early hours of July 3, 2015, an old lady was hit by a
speeding car at the intersection of Jalan Satu and Jalan Dua.
• The car then sped away westbound along Jalan Dua.
• The police retrieved the surveillance videos captured by all
buses that were in the neighborhood during that period.
• They used these videos to analyze potential escape paths that
the suspects may take.
179
Needed for Video Forensics Technologies
Rotation-Translation-
Blurred License Plate Scaling Invariant (RST- Trajectory Analysis on
Video Inpainting
Image Recognition invariant) Object Moving Objects
Recognition
• Under certain • A method for object • Event detection in a • As a video
condition, a suspect recognition that can large surveillance enhancement tool to
car or a human subject recognize patterns video database. repair digital videos.
grabbed from a video even when they are • Forensic cases involve • Used to transform
directly is usually deformed by objects that fell from cultural artifacts such
blurred. transformation of an elevated position. as vintage videos/films
• Appropriate rotation, scaling, and into digital formats.
image/video translation or a
processing technique combination of these.
must not modify the
content
180
E.g.: Rotation-Translation-Scaling
E.g.: Blurred License Plate
Invariant (RST-invariant) Object
Image Recognition
Recognition
181
E.g.: Trajectory Analysis on
E.g.: Video Inpainting
Moving Objects
182
Audio Forensics
• Acquisition, analysis, and evaluation of audio recordings that
may ultimately be presented as admissible evidence in a court
of law or some other official venue.
• The principal concerns of audio forensics are:
i. Establishing the authenticity of audio evidence
ii. Performing enhancement of audio recordings to improve speech
intelligibility and the audibility of low-level sounds
iii. Interpreting and documenting sonic evidence, such as identifying
talkers, transcribing dialog, and reconstructing crime or accident
scenes and timelines
• Popular tools: Audacity, iZotope RX, Adobe Audition, and Pro
Tools
183
E.g.: Modern digital speech
enhancement technique
• Used for cleaning up a recorded surveillance recording prior to
preparing a transcript,
• Court may need to be convinced that the “enhancement”
could not have resulted in a change to the meaning or
interpretation of the recorded dialog.
184
Well-known forensic audio cases
• Assassination of President Kennedy.
• Interpretation of background sounds from cockpit voice
recorder (black box) data.
• The use of voice identification techniques for authenticating
recordings of Osama bin Laden and other terrorists.
185
Standard approach for assessing the
authenticity of forensic audio recordings
1. Physically observe the entire length of the audio recordings.
2. Document the total length and mechanical integrity of the
audio recordings.
3. Verify that the recording is continuous with no unexplained
stop/start sequences or erasures.
4. Perform critical listening of the entire tape.
5. Use nondestructive signal processing as needed for
intelligibility enhancement.
186
Audio Analysis
• Waveform analysis
• Waveform display reflects graphically the relationship between the
time and amplitude of recorded sounds and allows the identification
and comparison of record events on evidence.
• An unnatural waveform present in the audio or video signal may
indicate that an edit has been made.
• Spectographic analysis
• To display the recorded material in time, frequency, and amplitude.
• Its distinctive display is used to further study the effects of record
events.
• Scanning software
• To search for indicators of digital editing.
187
How Audio Analysis Of Gunshots Helps
Solve Crimes
Reference: https://www.wbur.org/hereandnow/2017/05/25/audio-analysis-gunshots
188
Summary
• To investigate digital evidence effectively, it is important to
understand how operating systems work and how they store
files.
• It is also important to authenticate related digital graphics,
videos and audios as these are popularly used as supporting
evidences.
189