Digital Forensics Evidence Gathering
Digital Forensics Evidence Gathering
igital evidence is information stored or transmitted in binary form that may be relied on in
D
court. It can be found on a computer hard drive, a mobile phone, a CD, and a flash card in
a digital camera, among other places. Digital evidence is commonly associated with
electronic crime, or e-crime, such as child pornography or credit card fraud. However,
digital evidence is now used to prosecute all types of crimes, not just e-crime. For
example, suspects’ email or mobile phone files might contain critical evidence regarding
their intent, their whereabouts at the time of a crime, and their relationship with other
suspects.
In an effort to fight e-crime and to collect relevant digital evidence for all crimes, law
enforcement agencies are incorporating the collection and analysis of digital evidence into
their infrastructure.
https://nij.ojp.gov/topics/articles/new-approaches-digital-evidence-acquisition-and-analysis
f the device is already powered down,do not turnit on. Follow these steps for
forensically sound data collection:
1.Determine if the device is on or off:
● Look for lights
● Listen for sounds
● Feel for vibrations, haptic feedback and heat
● A smartphone, tablet or laptop may be in sleep mode and appear to be off
● If the device is a laptop or desktop, wiggle the mouse, but do not click any
buttons
● Is the smartphone or tablet’s screen greasy or dirty? Look for swipe patterns
● Press the Home button or swipe the screen
2.If the device is on, ask these questions and document the answers:
● Is the device locked?
● Is the user interface accessible?
● Is the device encrypted? Do you know the passcode?
● Is the battery charged?
3.If a smartphone, tablet or laptop is on, activate airplane mode
4.Record device model numbers, serial numbers and passcodes
5.Take pictures
6.Start a chain of custody document; DriveSavers will send you one
7.If a devicemustbe shut down in order to preserveESI (such as a computer), shut
the device down properly using the “shut down” command
8.If you suspect destructive software (formatting, deleting, removing or altering data)
is running, turn off the device immediately; pull the plug!
9.Check for any removable media
● D/DVD trays
C
● SD card slots
● Flash drives
● Sticky notes
nce a device is turned off, it can be delivered to a lab like DriveSavers for acquisition
O
and/or analysis. Package all components, clearly labeling all devices, preferably in
anti-static bags:
isk forensics is the science of extracting forensic information from digital storage media
D
like Hard disk, USB devices, Firewire devices, CD, DVD, Flash drives, Floppy disks etc..
The process of Disk Forensics are
1.Identify digital evidence
2.Seize & Acquire the evidence
3.Authenticate the evidence
4.Preserve the evidence
5.Analyze the evidence
6.Report the findings
7.Documenting
irst step in Disk Forensics is identification of storage devices atthesceneofcrimelike
F
hard disks with IDE/SATA/SCSI interfaces, CD, DVD, Floppy disk, Mobiles, PDAs, flash
cards, SIM, USB/ Fire wiredisks,MagneticTapes,Zipdrives,Jazzdrivesetc.Theseare
some of the sources of digital evidence.
ext step is seizing the storage media for digital evidence collection. This step is
N
performed at the scene of crime. In this step, a hash value of the storage media to be
seized is computed using appropriate cyber forensics tool. Hash value is a unique
signature generated by a mathematical hashing algorithm based on the content of the
storagemedia.Aftercomputingthehashvalue,thestoragemediaissecurelysealedand
taken for further processing.
ne of the cardinal rules of Cyber Forensics is “Never work on original evidence”. To
O
ensure this rule, an exact copy of the original evidence istobecreatedforanalysisand
digital evidence collection. Acquisition is the process of creating this exact copy, where
original storage media will be write protected and bit stream copying is made to ensure
completedataiscopiedintothedestinationmedia.Acquisitionofsourcemediaisusually
done in a Cyber Forensics laboratory.
uthenticationoftheevidenceiscarriedoutinCyberForensicslaboratory.Hashvaluesof
A
bothsourceanddestinationmediawillbecomparedtomakesurethatboththevaluesare
same,whichensuresthatthecontentofdestinationmediaisanexactcopyofthesource
media.
lectronicevidencesmightbealteredortamperedwithouttrace.Oncetheacquisitionand
E
authentication have been done,theoriginalevidenceshouldbeplacedinsecurestorage
keeping away from highly magnetic and radiation sources. One more copy of image
shouldbetakenanditneedstobestoredintoappropriatemediaorreliablemassstorage.
Optical media can be used as the mass storage. It is reliable, fast, longer life spanand
reusable.
erification of evidence before starting analysis is an important step in Cyber Forensics
V
process. This is done in Cyber Forensics laboratory before commencing analysis. Hash
value oftheevidenceiscomputedandcompareditwiththehashvaluetakenatthetime
of acquisition. If both the values are same, there is no change in the content of the
evidence. If both are different, there is some change in the content. The result of
verification should be properly documented.
nalysisistheprocessofcollectingdigitalevidencefromthecontentofthestoragemedia
A
depending upon the nature of the case being examined. This involves searching for
keywords,pictureanalysis,timelineanalysis,registryanalysis,mailboxanalysis,database
analysis, cookies, temporary and Internet historyfilesanalysis,recoveryofdeleteditems
and analysis, data carving and analysis, format recovery andanalysis,partitionrecovery
and analysis, etc.
aseanalysisreportshouldbepreparedbasedonthenatureofexaminationrequestedby
C
acourtorinvestigationagency.Itshouldcontainnatureofthecase,detailsofexamination
requested, details of material objects and hash values, result of evidence verification,
detailsofanalysisconductedanddigitalevidencecollected,observationsoftheexaminer
and conclusion. Presentation of the reportshouldbeinsimpletermsandprecisewayso
that non-technical persons should be able to understand the content of the report.
ocumentationisveryimportantineverystepoftheCyberForensicsprocess.Everything
D
should be appropriately documented to make a case admissible in a court of law.
Documentation should be started from the planning of case investigation and continue
through searching in scene of crime, seizure of material objects, chain of custody,
authenticationandacquisitionofevidence,verificationandanalysisofevidence,collection
ofdigitalevidenceandreporting,preservationofmaterialobjectsanduptotheclosingofa
c ase.
ttp://www.cyberforensics.in/(A(YFMf49VLzAEkAAAAMWE3NDQ2ZTEtNjg5MC00Mjc5LW
h
E0NjQtNTc2NDQxNjRlNTdhxwC8Rqlzd2-ICCb20r6htoqh1sI1))/Research/DiskForensics.a
spx?AspxAutoDetectCookieSupport=1
Digital Forensics, Part 5: Analyzing the Windows Registry for Evidence
Although nearly all Microsoft Windows users are aware that their system has a registry,
few understand what it does, and even fewer understand how to manipulate it for their
purposes. As a forensic analyst, the registry can be a treasure trove of evidence of what,
where, when, and how something occurred on the system.
The registry is a database of stored configuration information about the users, hardware,
and software on a Windows system. Although the registry was designed to configure the
system, to do so, it tracks such a plethora of information about the user's activities, the
devices connected to system, what software was used and when, etc. All of this can be
useful for the forensic investigator in tracking the who, what, where, and when of a forensic
investigation. The key is just knowing where to look.
Hives
Inside the registry, there are root folders. These root folders are referred to as hives. There
are five (5) registry hives.
● HKEY_USERS: contains all the loaded user profiles
● HKEYCURRENT_USER: profile of the currently logged-onuser
● HKEYCLASSES_ROOT: configuration information on theapplication used to open files
● HKEYCURRENT_CONFIG: hardware profile of the systemat startup
● HKEYLOCAL_MACHINE: configuration information includinghardware and software
settings
Registry Structure
The registry is structured very similarly to the Windows directory/subdirectory structure.
You have the five root keys or hives and then subkeys. In some cases, you have
sub-subkeys. These subkeys then have descriptions and values that are displayed in the
contents pane. Very often, the values are simply 0 or 1, meaning on or off, but also can
contain more complex information usually displayed in hexadecimal.
ttps://www.hackers-arise.com/post/2016/10/21/digital-forensics-part-5-analyzing-the-wind
h
ows-registry-for-evidence
Accessing the Registry
On our own system—not in a forensic mode—we can access the registry by using the
regedit utility built into Windows. Simply type regedit in the search window and then click
on it to open the registry editor like that below.
● Any devices mounted to the system including unique identifiers of flash drives, hard drives,
phones, tablets, etc.
The Windows registry tracks so much information about the user's activities. In most
cases, these registry keys are designed to make Windows run more efficiently and
smoothly. As a forensic investigator, these keys are like a road map of the activities of the
user or attacker.
One of those keys is the "RecentDocs" key. It tracks the most recent documents used or
opened on the system by file extension. It can be found at:
● HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Explorer\Rece
ntDocs
So, for instance, the most recently used Word documents would be found under .doc or
the .docx extension depending upon the version of Word they were created in (each key
can hold up to the last 10 documents). If we go to the .docx extension, we see the last 10
Word documents listed under this key.
When we click on one of those keys, it reveals information about the document as seen
below. We can view the document data in both hex, to the left, and ASCII, to the right. In
this case, it show that this document was a Metasploit course outline.
In some cases, an attacker will upload a .tar file, so that is a good place to look for breach
evidence. In general, you won't see a .tar file extension on a Windows machine, so the
presence of an entry here would be something that needs further investigation. Check the
files in the .tar key and see what they might reveal about the attack or attacker.
In civil or policy violation investigations, evidence might be found in the various graphic file
extensions such as .jpg, .gif, or .png.
TypedURLs Key
When the user types a URL in Internet Explorer, this value is stored in the registry at:
● HKEY_CURRENT_USER\Software\Microsoft\Internet Explorer\TypedURLs
●
When we open that key in the registry, it lists the last URLs that the user visited with IE.
This could reveal the source of malicious malware that was used in the breach, or in civil
or policy violation types of investigations, may reveal what the user was looking for/at.
The values will run from urI1 (the most recent) to urI25 (the oldest).
IP Addresses
The registry also tracks the IP addresses of the user interfaces. Note that there may be
numerous interfaces and this registry key tracks each interface's IP address and related
information.
HKEY_LOCAL_MACHINE\System\Services\CurrentControlSet\services\Tcpip\Param
eters\Interfaces
As we can see below, we can find the IP address assigned to the interface, the subnet
mask, and the time when the DHCP server leased the IP. In this way, we can tell whether
the suspect was using that particular IP at the time of the intrusion or crime.
Start Up Locations in the Registry
As a forensic investigator, we often need to find what applications or services were set to
start when the system starts. Malware is often set to start each time the system restarts to
keep the attacker connected. This information can be located in the registry in literally tens
of locations. We will look at a just a few of the most commonly set keys.
Probably the most used location is:
● HKEY_LOCAL_MACHINE\Software\Microsoft\Windows\CurrentVersion\Run
Any software/locations designated in these subkeys will start every time the system starts.
Rootkits and other malicious software can often be found here and they will start each time
the system starts.
RunOnce Startup
If the hacker just wanted the software to run once at start up, the subkey may be set here.
● HKEY_LOCAL_MACHINE\Software\Microsoft\Windows\CurrentVersion\RunOnce
Start Up Services
The key below lists all the services that set to start at system startup. If the key is set to 2,
the service starts automatically; if it is set to 3, the service must be started manually; and if
the key is set to 4, the service is disabled.
● HKEY_LOCAL_MACHINE\System\CurrentControlSet\Services
Start Legacy Applications
When legacy 16-bit applications are run, the program listed is run at:
● HKEY_LOCAL_MACHINE\System\CurrentControlSet\Control\WOW
Start When a Particular User Logs On
In the following key, the values are run when the specific user logs in.
● HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Run
Storage Artifacts in the Registry
Often, the suspect will use a Flash drive or hard drive for their malicious activities and then
remove them so as not to leave any evidence. The skilled forensic investigator, though,
can still find traces of evidence of those storage devices within the registry, if they know
where to look.
The registry on a Windows system varies a bit from version to version. A skilled,
professional digital forensic investigator needs to be able to work with nearly all versions of
Windows and other operating systems. Since Windows 7 is still the most widely used
operating system, by far, I will be demonstrating on it. Keep in mind, though, that this will
vary slightly between versions.
USB Storage Devices
Imagine a case where we suspect that someone installed a keylogger or removed
confidential information with a USB drive. How would we find evidence that a USB storage
device was inserted and used? To find evidence of USB storage devices, we want to look
at the following key.
HK_Local_Machine\System\ControlSet00x\Enum\USBSTOR
In this key, we will find evidence of any USB storage device that has ever been connected
to this system. Expand USBSTOR to see a listing of every USB storage device ever
connected to this system.
In the screenshot above, I have circled one suspicious looking USB device. When we
expand it, it reveals a unique identifier for that device. By clicking on this identifier, we can
find much more information about the device.
As you can see in the screenshot above, when we click on the USB storage identifier, it
reveals in the right-hand window the Global Unique Identifier (GUID), the friendly name,
and the hardware ID, among other things. This may be exactly the evidence we need to tie
the suspect to their activity on this system!
Mounted Devices
If the suspect used any hardware device that must be mounted to either read or write data
(CD-ROM, DVD, hard drive, flash drive, etc.), the registry will record the mounted device.
This information is stored at:
HKEY_LOCAL_MACHINE\System\MountedDevices
As you can see below, when we click on this key, it provides us a long list of every device
ever mounted on that machine.
If we need further information on any of those mounted devices, we cansimply click on it,
and it will open a small app that will enable us to read the data in ASCII. As you can see,
this device was an IDE CD-ROM manufactured by Teac.
If there is not a TEAC CD_ROM on the system, the forensic investigator now knows that
they need to find this piece of hardware to find further evidence of the crime.
The registry is a depository of volumes of information on what happened on a Windows
system, and by learning our way around it, we can reconstruct the elements of a crime that
it was used for.
ttps://resources.infosecinstitute.com/topic/windows-systems-and-artifacts-in-digital-forens
h
ics-part-i-registry/
● Websites accessed, when, and for how long.
● USB devices inserted and removed from the computer.
● Which wireless networks the machine has seen, and when connected and
disconnected.
● When the defendant booted up or shut down their work computer.
● User profiles accessing the machine, when, and for how long.
● New and deleted user profiles.
● User access to the machine whether directly or remotely.
● Email communications content and from and to whom they are being received and
sent.
● Computer application use and frequency.
● Contraband photos downloaded from the internet, when accessed, how re-named if
applicable.
● Deleted files, emails, documents, and more.
https://www.howelawfirm.com/e-discovery-and-forensics/computer-evidence/computer-log-
files/
● H
igh availability. Timely action that occurs based on information uncovered by log
analysis can prevent an issue from causing downtime. This in turn can help ensure
that the organization meets its business goals, and that the IT organization meets
its commitments to provide services with a given uptime guarantee.
● A
voiding over- or under-provisioning. While organizations must plan to meet peak
demands, log analysis can help project whether there is sufficient CPU, memory,
disk, and network bandwidth to meet current demands – and projected trends.
Overprovisioning wastes precious IT dollars, and under-provisioning can lead to
service outages as organizations scramble to either purchase additional resources
or utilize cloud resources to meet flexes in demand.
● S
ales and Marketing Effectiveness. By tracking metrics such as traffic volume and
the pages that customers visit, log analysis can help sales and marketing
professionals understand what programs are effective, and what should be
changed. Traffic patterns can also help with retooling an organization’s website to
make it easier for users to navigate to the most frequently accessed information.
log analysts task is to help interpret the full range of log data and messages in context,
A
which requires normalization of the log data to ensure use of a common set of terminology.
This prevents confusion that might arise if one function signals ‘normal’ and other function
signals ‘green’ when they both mean that there is no action required.
enerally, log data is collected for the log analysis program, cleansed, structured or
G
normalized and then offered for analysis for the experts to detect patterns or uncover
anomalies such as a cyber-attack or data exfiltration. Performing log file analysis generally
follows these steps:
1.Data collection: Data from hardware and software probesis collected to a central
database
2.Data indexing: Data from all sources is centralizeand indexed to speed
searchability, enhancing IT professionals ability to rapidly uncover problems or
patterns
3.Analysis: Log analysis tools including normalization, pattern recognition,
correlation, and tagging can be done either automatically using machine learning
tools or manually where needed.
4.Monitoring: A Real-time, autonomous log analysis platformcan generate alerts
when anomalies are detected. This type of automated log analysis is the
underpinning for most continuous monitoring of the full IT stack
5.Reports: Both traditional reports and dashboards arepart of a log analysis platform,
providing either at-a-glance or historical views of metrics for operations,
development, and management stakeholders
https://www.vmware.com/topics/glossary/content/log-analysis.html
Normalization
ormalization is a data management technique that ensures all data and attributes, such
N
as IP addresses and timestamps, within the transaction log are formatted in a consistent
way.
Pattern recognition
attern recognition refers to filtering events based on a pattern book in order to separate
P
routine events from anomalies.
Classification and tagging
lassification and tagging is the process of tagging events with key words and classifying
C
them by group so that similar or related events can be reviewed together.
Correlation analysis
orrelation analysis is a technique that gathers log data from several different sources and
C
reviews the information as a whole using log analytics.
Artificial ignorance
rtificial ignorance refers to the active disregard for entries that are not material to system
A
health or performance.
https://www.humio.com/glossary/log-analysis/
Email forensics
●
he vital details in email headers can help investigators and forensics experts in email
T
investigation. For instance, theDelivered-Tofieldcontains email address of recipient and
theReceived-Byfield contains last visited SMTP server’sIP address, its SMTP ID, and
the date and time at which the email is received. Similarly, theReceived: fromfield may
provide key details like IP address of sender and host name. Such information can be
instrumental in identifying the culprit and collecting evidence.
2. Email Server Investigation
mail servers are investigated to locate the source of an email. If an email is deleted from
E
client application, sender’s or receiver’s, then related ISP or Proxy servers are scanned as
they usually save copies of emails after delivery. Servers also maintain logs that can be
analyzed to identify address of the computer from which the email is originated.
It’s worth noting that HTTP and SMTP (common messaging initiation protocol) logs are
archived frequently by large ISPs. If a log is archived then tracing relevant emails can take
a lot of time and effort, as it requires decompressing and extraction techniques. So, it’s
best to examine the logs as soon as possible lest they are archived.
ometimes, suspects take precautionary measures like using a proxy server to protect
S
their identity. In that case, the IP address of the proxy server is recorded. However, the log
on the proxy server can be analyzed to track the suspect. If the log isn’t available either,
then the investors can send an email that contains either of the following:
H
● TML page with an Active X Object
● Embedded Java Applet that’s configured to run on the recipient’s computer
oth of these can record the IP address of the suspect’s computer and send the same to
B
the email address of the investigators.
https://www.stellarinfo.com/blog/email-forensics-investigation-guide-for-security-experts/
These artifacts are files stored inside of specific folders in the operating system.
ach browser stores its files in a different place than other browsers and they all have
E
different names, but they all store (most of the time) the same type of data (artifacts).
● A
ddons + Extensions [SQLite Database] :Contains dataabout the installed
addons in the browser.
:\Users\XXX\AppData\Roaming\Mozilla\Firefox\Profiles\[profileID].default\addons.sqliteC:\Users\XXX\AppD
C
ata\Roaming\Mozilla\Firefox\Profiles\[profileID].default\extensions.sqlite
● T
humbnails:Folder containing the images shown whenwe open the
“about:newtab” page.
C:\Users\XXX\AppData\Local\Mozilla\Firefox\Profiles\[profileID].default\thumbnails
● Cache
C:\Users\XXX\AppData\Local\Packages\Microsoft.MicrosoftEdge_XXX\AC\#!XXX\MicrosoftEdge\Cache
● Sessions
- Last Active
SessionC:\Users\XX\AppData\Local\Packages\Microsoft.MicrosoftEdge_XXX\AC\MicrosoftEdge\User\Defau
lt\Recovery\Active
Internet Explorer [Coming Soon]
Opera [Coming Soon]
Safari [Coming Soon]
Tools
ow that we’ve seen the different artifacts that we can collect from a forensics point of
N
view.
Let’s take a look at some of the tools that can help us make sens of this data.
D
● B Browser for SQLite(Open “.sqlite” files)
● Nirsoft Web Browsers Tools(Contains a multitude oftools to open cache files,
cookies and history data)
● BrowsingHistoryView
● ESEDatabaseView
● Session History Scrounger for Firefox(Opens “.jsonlz4”files)
● Sysinternals Strings
● OS Forensics
● Magnet IEF(Internet Evidence Finder)
● Browser History Viewer
● Browser History Examiner(Free Trial)
● Hindsight
● libsedb(Library to access the Extensible StorageEngine (ESE) Database File
(EDB) format)
● Web Browser Addons View(Use to view installed extensionsand addons)
● The LaZagne Project
● firepwd.py (open source tool to decrypt Mozilla protected passwords)
● Firefox Search Engine Extractor(Open ‘search.json.mozlz4’files)
● Firefox Bookmark Backup Reader/Decompressor(Open‘ jsonlz4’ files)
https://nasbench.medium.com/web-browsers-forensics-7e99940c579a
Malware Forensics
alware is brief for Malicious Software. it’s software that’s specially designed to harm
M
computerdatainhowortheopposite.Malwarehaveevolvedwithtechnology&hastaken
full advantage of latest technological developments .
alware consists of programming (code, scripts, active content, and other software)
M
designed to disrupt or deny operations,gatherinformationthatresultsinlossofprivacy
rexploitation,gainunauthorizedaccesstosystemresourcesandotherabusivebehavior
o
.
● ackdoor
B
● Botnet
● Downloader
● Launcher
● Rootkit
● HackTool
● Rogue application
● Scareware
● Worm or Virus
● Credential-stealing program, etc.
https://info-savvy.com/what-is-malware-forensics/
igitalforensicshasbeendefinedastheuseofscientificallyderivedandprovenmethods
D
towards the identification, collection, preservation,validation,analysis,interpretation,and
presentation of digital evidence derivative from digital sources to facilitate the
reconstruction of events found to be criminal. But these digital forensics investigation
methods face some major challenges at the time of practical implementation. Digital
forensic challenges are categorized into three major heads as per Fahdi, Clark, and
Furnell (2013) these are:-
T
● echnical challenges,
● Legal challenges,
● Resource Challenges
TECHNICAL CHALLENGES
s technology develops crimes and criminals are also developed with it. Digital forensic
A
expertsuseforensictoolsforcollectingshredsofevidenceagainstcriminalsandcriminals
use such tools for hiding,alteringorremovingthetracesoftheircrime,indigitalforensic
thisprocessiscalledAnti-forensicstechniquewhichisconsideredasamajorchallengein
digital forensics world. Anti-forensics techniques are categorized into the following
types:-
S. No. Type Description
● perating in the cloud
O
● Time to archive data
● Skill gap
● Steganography
LEGAL CHALLENGES
● rivacy Issues
P
● Admissibility in Courts
● Preservation of electronic evidence
● Power for gathering digital evidence
● Analyzing a running computer
Resource Challenges
s the rate of crime increases the number of data increases and the burden toanalyze
A
such huge data is also increases on a digital forensicexpertbecausedigitalevidenceis
more sensitive as comparedtophysicalevidenceitcaneasilydisappear.Formakingthe
investigation process fast and useful forensic experts use various tools to check the
authenticity of the data but dealing with these tools is also a challenge in itself.
ue to rapid change in technology like operating systems, application software and
D
hardware, reading of digital evidence becoming more difficult because new version
software’s are not supported to an olderversionandthesoftwaredevelopingcompanies
did provide any backward compatible’s which also affects legally.
he confidentiality, availability, and integrity of electronic documents are easily get
T
manipulated. Thecombinationofwide-areanetworksandtheinternetformabignetwork
thatallowsflowingdatabeyondthephysicalboundaries.Sucheasinessofcommunication
and availability of electronic document increases the volume of data which also create
difficulty in the identification of original and relevant data.
hescopeofcyberforensicsiswiderinitselfandtheuseofvarioustoolsandtechniques
T
and their different wayofworkingraiselotsofissuesinfrontoflegalaswellastechnical
experts. Some common challenges are lack of availability of proper guidelines for
collectionacquisitionandpresentationofelectronicevidence,rapidchangeintechnology,
big data, use of anti-forensic techniques by criminals, use of free online tools for
investigation, etc. are pointing towards the need ofnewenactmentsandamendmentsin
present law and technologies with patches.
o deal with the above-mentioned issues we must have a specific national law which is
T
applicableoneverypersonwhoisinvolvedinadigitalforensicinvestigationordealingwith
it or provide any service, tool or software which is used for investigation purpose. The
investigationorganizationsneedtoconducttrainingandawarenessprogrammersfortheir
digital forensics officers so that they will be familiar with new technologies and also the
companieswhomadetoolsfordigitalforensicinvestigationmustprovideproperinstruction
manualsthathaveaproperexplanation,pros,andconsregardingthetools.Themobileor
softwaredevelopingcompaniesneedtoprovidepatchesrelatedtooutdatedtechnologyso
theexpertscaneasilyanalyzeandpreservedataforevidencepurposesiftheyfoundany
old mobile model or old computer system on the crime scene. Investigating offices also
need to take due diligence during an investigation.
https://legaldesire.com/challenges-faced-by-digital-forensics/