Professional Documents
Culture Documents
Submitted by:
[1]
Institute Code: 0141
CERTIFICATE
Certified that this micro project report titled “Report on Digital Forensic” is the bonafide work
of Mr. Sarvesh Khade Roll no: 2331 of Third year diploma in Information Technology
engineering for the course: ETI Course Code: 22618 during the academic year 2023–2024,
who carried out the micro project work under my supervision.
[2]
Institute Code: 0141
CERTIFICATE
Certified that this micro project report titled “Report on Digital Forensic” is the bonafidework
of Mr. Mahesh Marne Roll no: 2332 of Third year diploma in Information Technology
engineering for the course: ETI Course Code: 22618 during the academic year 2023–2024,
who carried out the micro project work under my supervision.
[3]
Institute Code: 0141
CERTIFICATE
Certified that this micro project report titled “Report on Digital Forensic” is the bonafide work
of Mr. Sahil Mazire Roll no: 2333 of Third year diploma in Information Technology
engineering for the course: ETI Course Code: 22618 during the academic year 2023–2024,
who carried out the micro project work under my supervision.
[4]
ALL INDIA SHRI SHIVAJI MEMORIAL SOCIETY’S
POLYTECHNIC, PUNE -01
Information Technology Department
[5]
ALL INDIA SHRI SHIVAJI MEMORIAL SOCIETY’S
POLYTECHNIC, PUNE -01
Information Technology Department
[6]
Acknowledgement
Presentation inspiration and motivation have always played a key role in the success of
any venture.
We express our sincere thanks to Honorable Principal Mr. S. K. Giram Sir, AISSMS
Polytechnic,
We pay our deep sense of gratitude to Respected Head of Information Technology
Department, AISSMS Polytechnic, Mrs. A.S Khandagale Ma’am, to encourage us and to
support us to prepare the Microproject. We feel to acknowledge our indebtedness and deep
sense of gratitude to the course teacher Mr. V.V Shetkar sir whose valuable guidance and kind
supervision have given us throughout the microproject which shaped the present work as its
show.
We are immensely obliged to our friends for their elevating inspiration, encouraging
guidance and kind supervision in the completion of our micro-project. Last, but not the least,
our parents are also an important inspiration for us. So with due regards, We express our
gratitude’s to them.
[7]
Index
1. Annexure I 9
5. Literature Review 12
Project
13. Logbook 28
[8]
Annexure-I
Micro-Project Proposal
Advancements and applications of Computer Engineering and Information Technology are ever-
changing. Emerging trends aim at creating awareness about major trends that will define technological
disruption in the upcoming years in the field of Computer Engineering and Information Technology.
These are some emerging areas expected to generate revenue, increase demand for IT professionals,
and open avenues of entrepreneurship.
[9]
4.0 Action Plan:
[10]
5.0 Resources Required:
[11]
Annexure-II
Micro-Project Report
https://www.interpol.int/en/How-we-work/Innovation/Digital-forensics
https://edusj.mosuljournals.com
https://www.educba.com/what-is-digital-forensics/
https://networksimulationtools.com/digital-forensics-final-year-project-ideas/
[12]
5.0 Actual Methodology Followed:
[13]
7.0 Inputs and Outputs of Micro-Project:
What is forensic?
Collection and analysis of evidence Using scientific tests or techniques To establish facts against crime
For presenting in a legal proceeding. Therefore forensic science is a scientific method of gathering and
examining information about the past which is then used in a court of law.
Digital Forensics is the use of scientifically derived and proven methods for the protection, collection,
validation, identification, analysis, interpretation, documentation, and presentation of digital evidence
derived from digital devices for the purpose of facilitation or furthering the reconstruction of events
found to be criminal or assisting to anticipate unauthorized actions shown to be disruptive to planned
operations.
Digital Evidence
• Evidence A piece of information that supports a conclusion.
• Any data that is recorded or preserved on any medium in or by a computer system or other similar
digital device, that can be read or understood by a person or a computer system or other similar device.
• It includes a display, printout, or other output of that data.
[14]
Characteristics of Digital Evidence
[15]
Process Of Digital Forensic Basic Model
In the field of Digital Forensics, we follow a pattern where we first identify each case, then preserve
and analyze the evidence. We document the findings in a manner that enables us to present the
evidence in the court of law, ultimately helping to identify the culprit in the crime.
1. Identification
It is the first and fore more step in the process, including the forensic process, like where the evidence is found,
where it is preserved, and how it is stored.
Electronic Device media includes PC, digital phones, IPads, etc.
2. Preservation
An isolating place stores the evidence to secure and preserve it from theft. People are prevented from buying
digital devices to ensure no proof is meddled with.
3. Analysis
In this phase, the inspection group will reform the chunks of evidence and determine the outcome based on the
resulting proofs or evidence. But it may sometimes take several iterations to discover the support on a criminal
case.
4. Documentation
In this stage, all possible evidence of data is drawn from the given inputs. It will help in rebuilding the crime
scene and analyzing it. The investigators document the correct documentation of the crime scenes by mapping
the crime scene, sketching it, and then relating its photographs with the documents.
5. Presentation
To conclude, we summarize and explain the documents.
[16]
Types of Digital Forensic
Disk Forensics: It will deal with deriving the evidence from digital storage media like USB Devices,
DVDs, CDs, etc., by gathering the active files or modifying or deleting them.
Network Forensics: It is generally a sub-part of digital forensics relating to the monitoring and detecting
system network traffic to extract crucial data for all legal evidence to present at the court.
Wireless Forensics: It is a part of the networking forensics type that aims for wireless forensics to allow
the tools needed to gather and extract evidence from networking wireless traffic.
Database Forensics: This type of digital forensics relates to the forensic study and collection of databases
and their relevant metadata. It follows investigating techniques to query the database to collect the
evidence.
Malware Forensics: This branch of forensics handles identifying malicious code and studying malware
issues related to their workload, trojans, viruses, etc.
Email Forensics: This forensic branch handles the recovery of the trashed data and analyses the contents
of the emails, including the emails that are deleted or the calendar or the contacts in the email.
Memory Forensics: A forensic analysis collects the data from the computer’s cache memory or RAM
dump and then gathers the evidence.
[17]
Title: Exploring the Ethical Hacking Process Through the Lens of Digital Forensics
In today's interconnected digital landscape, the prevalence of cyber threats continues to rise, necessitating
proactive measures to safeguard sensitive information and critical systems. Ethical hacking, a practice
commonly employed to identify vulnerabilities within a system, aligns closely with the principles and
methodologies of digital forensics. By delving into the ethical hacking process through the perspective of
digital forensics, we gain a deeper understanding of the strategies and techniques utilized to bolster
cybersecurity defenses.
Ethical hacking, also known as penetration testing, involves authorized individuals or teams simulating
cyber attacks to assess the security posture of an organization's systems, networks, and applications.
Conversely, digital forensics focuses on the identification, preservation, analysis, and presentation of digital
evidence to investigate cybercrimes and security incidents. While their objectives may differ, both
disciplines share commonalities in terms of methodologies and investigative approaches.
The ethical hacking process begins with meticulous planning and preparation. This phase encompasses
defining the scope of the engagement, establishing objectives, and obtaining necessary permissions from the
client or organization. Similarly, in digital forensics, investigators outline the goals of the investigation,
identify the types of evidence to be collected, and ensure compliance with legal and regulatory requirements.
Effective planning lays the foundation for a structured and systematic approach to both ethical hacking and
digital forensics engagements.
3. Information Gathering:
Information gathering forms a crucial aspect of both ethical hacking and digital forensics. Ethical hackers
collect publicly available intelligence about the target organization, including network architecture, system
configurations, and employee information. Likewise, digital forensics investigators gather evidence from
various sources, such as log files, system artifacts, and network traffic captures, to reconstruct events and
identify potential sources of compromise. This phase relies heavily on reconnaissance and reconnaissance
techniques to gather actionable intelligence.
4. Vulnerability Analysis:
Once information is collected, ethical hackers analyze it to identify potential vulnerabilities and
weaknesses within the target system. This may involve conducting vulnerability scans, assessing software
versions, and researching known exploits. Similarly, digital forensics investigators analyze collected
evidence to identify security breaches, unauthorized access, and potential weaknesses in the system.
Vulnerability analysis serves as a critical precursor to the exploitation phase, enabling ethical hackers and
digital forensics investigators to prioritize their efforts and resources effectively.
[18]
5. Exploitation:
In the exploitation phase, ethical hackers attempt to exploit identified vulnerabilities to gain unauthorized
access to the target system or data. This may involve leveraging social engineering tactics, network
exploitation techniques, or software vulnerabilities to simulate real-world attacks. Concurrently, in digital
forensics, investigators recreate the sequence of events leading to a security incident or breach, often
through simulation or controlled experiments. By emulating attacker behavior, ethical hackers and digital
forensics investigators gain valuable insights into the potential impact of security flaws and weaknesses.
The final phase of the ethical hacking process involves documenting the findings and recommendations in
a comprehensive report. Ethical hackers present their findings to the client, along with actionable insights
and remediation strategies to enhance the organization's security posture. Similarly, in digital forensics,
investigators compile detailed reports of their findings, including the methods used, evidence collected, and
conclusions drawn. These reports serve as valuable resources for legal proceedings, regulatory compliance,
and internal investigations, guiding organizations in implementing proactive measures to mitigate future
risks.
7. Conclusion:
Ethical hacking and digital forensics represent complementary approaches to cybersecurity, each
contributing to the overall resilience and effectiveness of an organization's defenses. By examining the
ethical hacking process through the lens of digital forensics, we gain a comprehensive understanding of the
methodologies, techniques, and best practices employed to identify, analyze, and mitigate cyber threats.
Through collaboration and continuous learning, ethical hackers and digital forensics investigators play
instrumental roles in safeguarding digital assets and preserving the integrity of information systems in
an ever-evolving threat landscape.
In recent years, blockchain technology has emerged as a revolutionary force, offering unparalleled
transparency, security, and decentralization in various sectors, including finance, supply chain management,
and healthcare. From a digital forensic standpoint, blockchain presents both novel challenges and innovative
solutions, reshaping the landscape of investigative practices. Let's delve into the intricacies of blockchain
technology through the lens of digital forensics.
At its core, a blockchain is a distributed ledger that records transactions across a network of interconnected
nodes. Each transaction is cryptographically linked to the preceding one, forming a chain of blocks that are
sequentially arranged and immutable. This decentralized architecture eliminates the need for intermediaries,
enhancing transparency and reducing the risk of fraud or tampering.
[19]
2. Immutable Nature and Forensic Implications:
The immutability of blockchain data poses both challenges and opportunities for digital forensics. Once a
transaction is recorded on the blockchain, it becomes virtually impossible to alter or erase without consensus
from the network participants. While this ensures data integrity and auditability, it also presents forensic
investigators with the daunting task of analyzing historical transactions accurately. However, this
immutability can serve as a valuable asset in forensic investigations, as it provides a reliable source of truth
for reconstructing digital trails and verifying authenticity.
6. Conclusion:
In conclusion, blockchain technology revolutionizes digital forensics by introducing unprecedented levels
of transparency, security, and decentralization. While blockchain's immutable nature and pseudonymous
transactions pose challenges for forensic analysis, they also offer opportunities for enhancing investigative
techniques and preserving digital evidence. By embracing innovative methodologies and leveraging
specialized tools, digital forensic experts can navigate the complexities of blockchain ecosystems and
unravel the mysteries of digital transactions with unparalleled precision and efficacy. As blockchain
continues to evolve, so too will the role of digital forensics in safeguarding the integrity of decentralized
networks and preserving justice in the digital age.
[20]
7.0 Skill Developed/Learning Outcomes of this Micro-Project:
o Crime Detection- There are various malwares and malicious activities that happen over digital media and
networks, such as phishing, spoofing, ransomware, etc.
o Crime Prevention- There are various cyber crimes that happen due to lack of security or existing unknown
vulnerabilities, such as zero-day vulnerability. Hence, cyber forensics helps in finding out these
vulnerabilities and avoiding such crimes to occur.
o Crime Analysis- This is the main application of digitalCrime Detection- There are various malwares and
malicious activities that happen over digital media and networks, such as phishing, spoofing, ransomware,
etc.
o Crime Prevention- There are various cyber crimes that happen due to lack of security or existing unknown
vulnerabilities, such as zero-day vulnerability. Hence, cyber forensics helps in finding out these
vulnerabilities and avoiding such crimes to occur.
o Crime Analysis- This is the main application of digital forensics. It involves- [2]
o Preservation- This process involves protecting the crime scene and the digital evidence or setup from
further manipulation and photographing and video graphing the crime scene, for future reference. Also this
process involves stopping any ongoing command that may be linked to the crime.
o Identification- This process involves identifying the digital media and devices that can serve as
thepotential evidence.
o Extraction- This process involves the imaging of the digital evidence, (to maintain the authenticity of the
original evidence), for further analysis.
o Documentation- This involves maintaining the chain of custody and documenting all the evidence collected
from the crime scene.
o Interpretation- This involves making of a report by the digital forensic expert about the analysis conducted
on the digital evidence using various tools such as FTK (for imaging and mounting of evidences),SleuthKit
and Autopsy (analyzes disk images and recover files from them) etc. and presenting it in the court of law.
The conclusion is based on the evidence collected and reconstructing data fragments.
[21]
Annexure - III
[22]
and good
Appearance/ and good finish/
finish is finish. But no appearance.
shabby. creativity in Creativity
design and in design
use of and use of
material material.
6. Report Preparation Very short, Nearly Detailed, Very detailed,
poor quality sufficient and correct and correct, clear
sketches, correct details clear description of
Details about about description of methods,
methods, methods, methods, materials,
materials, materials, materials, precautions
Precautions precautions precautions and
and and and conclusion.
Conclusions conclusion. conclusion. Enough
omitted, some but clarity is Sufficient tables, charts
details are not there in graphic and sketches
wrong. presentation. description
But notenough
graphic
description
7. Presentation of the Major Includes major Includes Well
Micro-Project information is information major organized,
not included, but not well information Includes
information is organized not but not well major
not well presented organized not information,
organized. well. presented presented
well. well.
8. Viva Could not Replied to Replied Replied most
reply to considerable properly of the
considerable number of considerable questions
number of questions but number of properly
question not very question.
properly
[23]
Micro Project Evaluation Sheet
Dated Signature………………………………………………………………
[24]
Micro Project Evaluation Sheet
Dated Signature………………………………………………………………
[25]
Micro Project Evaluation Sheet
[26]
AISSMS’s Polytechnic, Pune- 01(0141)
Annexure IV: Rubrics Used for Evaluation of a Micro Project
Assessment of micro project based on rubrics for performance in group activity :( Marks to be
given out of 06) Assessment of performance in individual presentation/Viva of micro project:
(Marks to be given out of 04 Scale used for assessment: Poor (1-3), Average (4-5), Good (6-8),
Excellent (9-10)
A) Process and Product Assessment (A):
Rubric
Characteristics to be assessed Marks Obtained out of 10
No.
1 Relevance to course
2 Literature review/information collection
3 Completion of target as per project proposal
4 Analysis of data and representation
5 Quality of prototype/model
6 Report Preparation
Total Out of (60)
Process and Product Assessment (A) :Total Out of (06)
B) Individual Presentation/Viva(B)
Rubric Individual
Rubric 7 Individual
8 Presentatio
Presentatio
n/Viva
n/Viva
(Convert Total
Individual Individ (Addition of
out of 08 (A+B)
Roll Enrollment Presentatio ual marks in
Name of Student marks into
No. No. n Viva Rubric 7 to
out of 4)
8)
(B)
Marks
Marks Marks out Marks out Marks
out of
out of 10 10 of 20 of 04 out of
10
2101410332 Ms. Sarvesh Khade
2331
2101410359 Ms. Mahesh Marne
2332
Ms. Sahil Mazire
2333 2101410347
Mr. V.V Shetkar
Name & signature of
Faculty
[27]
Log Book of the Student (Hourly Work Report)
Academic Year: 2023-24
Name of Student: Sarvesh Khade, Mahesh Marne, Sahil Mazire.
[28]
Evaluation Sheet for the Micro Project
Roll Student Name Marks out of (6) Marks out of (4) Total out of
No. for performance for performance (10)
in group activity in oral /
presentation
Mr. Sarvesh
2331 Khade
Mr. Mahesh
2332 Marne
Mr. Sahil Mazire
2333
Mr. V.V Shetkar
(Dated Signature)
[29]