- There are THREE basic Phases
- System Preservation Phase
- Evidence Searching Phase
- Event Reconstruction Phase
###
Consider a traditional crime scene where someone got shot by bullets.
Will you allow people to walk over the scene? No because it damages the scene.
Will you stop working only after securing the scene? No, you will Search for useful evidence.
Will you stop after finding evidence ? No , you will try to reconstruct the event, guessing more details etc.
###
There are two types of investigations
- Dead investigation
- running trusted application in trusted OS.
- attaching seized pendrive to investigation workstation.
- Live investigation
- OS or other resources of the system are being investigated.
- investigating ongoing attack on the working server.