<?xml version="1.0"?>
<feed xmlns="http://www.w3.org/2005/Atom" xml:lang="en">
	<id>https://lms.onnocenter.or.id/wiki/index.php?action=history&amp;feed=atom&amp;title=Forensic_Report%3A_Examination_Procedures_%28en%29</id>
	<title>Forensic Report: Examination Procedures (en) - Revision history</title>
	<link rel="self" type="application/atom+xml" href="https://lms.onnocenter.or.id/wiki/index.php?action=history&amp;feed=atom&amp;title=Forensic_Report%3A_Examination_Procedures_%28en%29"/>
	<link rel="alternate" type="text/html" href="https://lms.onnocenter.or.id/wiki/index.php?title=Forensic_Report:_Examination_Procedures_(en)&amp;action=history"/>
	<updated>2026-04-28T11:39:30Z</updated>
	<subtitle>Revision history for this page on the wiki</subtitle>
	<generator>MediaWiki 1.45.1</generator>
	<entry>
		<id>https://lms.onnocenter.or.id/wiki/index.php?title=Forensic_Report:_Examination_Procedures_(en)&amp;diff=71037&amp;oldid=prev</id>
		<title>Unknown user at 22:36, 20 October 2024</title>
		<link rel="alternate" type="text/html" href="https://lms.onnocenter.or.id/wiki/index.php?title=Forensic_Report:_Examination_Procedures_(en)&amp;diff=71037&amp;oldid=prev"/>
		<updated>2024-10-20T22:36:12Z</updated>

		<summary type="html">&lt;p&gt;&lt;/p&gt;
&lt;table style=&quot;background-color: #fff; color: #202122;&quot; data-mw=&quot;interface&quot;&gt;
				&lt;col class=&quot;diff-marker&quot; /&gt;
				&lt;col class=&quot;diff-content&quot; /&gt;
				&lt;col class=&quot;diff-marker&quot; /&gt;
				&lt;col class=&quot;diff-content&quot; /&gt;
				&lt;tr class=&quot;diff-title&quot; lang=&quot;en&quot;&gt;
				&lt;td colspan=&quot;2&quot; style=&quot;background-color: #fff; color: #202122; text-align: center;&quot;&gt;← Older revision&lt;/td&gt;
				&lt;td colspan=&quot;2&quot; style=&quot;background-color: #fff; color: #202122; text-align: center;&quot;&gt;Revision as of 22:36, 20 October 2024&lt;/td&gt;
				&lt;/tr&gt;&lt;tr&gt;&lt;td colspan=&quot;2&quot; class=&quot;diff-lineno&quot; id=&quot;mw-diff-left-l1&quot;&gt;Line 1:&lt;/td&gt;
&lt;td colspan=&quot;2&quot; class=&quot;diff-lineno&quot;&gt;Line 1:&lt;/td&gt;&lt;/tr&gt;
&lt;tr&gt;&lt;td class=&quot;diff-marker&quot; data-marker=&quot;−&quot;&gt;&lt;/td&gt;&lt;td style=&quot;color: #202122; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #ffe49c; vertical-align: top; white-space: pre-wrap;&quot;&gt;&lt;div&gt;&lt;del style=&quot;font-weight: bold; text-decoration: none;&quot;&gt;Sure! Here&#039;s the translated text in English while retaining the wiki format:&lt;/del&gt;&lt;/div&gt;&lt;/td&gt;&lt;td colspan=&quot;2&quot; class=&quot;diff-side-added&quot;&gt;&lt;/td&gt;&lt;/tr&gt;
&lt;tr&gt;&lt;td class=&quot;diff-marker&quot; data-marker=&quot;−&quot;&gt;&lt;/td&gt;&lt;td style=&quot;color: #202122; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #ffe49c; vertical-align: top; white-space: pre-wrap;&quot;&gt;&lt;div&gt;&lt;del style=&quot;font-weight: bold; text-decoration: none;&quot;&gt;&lt;/del&gt;&lt;/div&gt;&lt;/td&gt;&lt;td colspan=&quot;2&quot; class=&quot;diff-side-added&quot;&gt;&lt;/td&gt;&lt;/tr&gt;
&lt;tr&gt;&lt;td class=&quot;diff-marker&quot;&gt;&lt;/td&gt;&lt;td style=&quot;background-color: #f8f9fa; color: #202122; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #eaecf0; vertical-align: top; white-space: pre-wrap;&quot;&gt;&lt;div&gt;==5. Digital Forensic Examination Procedures==&lt;/div&gt;&lt;/td&gt;&lt;td class=&quot;diff-marker&quot;&gt;&lt;/td&gt;&lt;td style=&quot;background-color: #f8f9fa; color: #202122; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #eaecf0; vertical-align: top; white-space: pre-wrap;&quot;&gt;&lt;div&gt;==5. Digital Forensic Examination Procedures==&lt;/div&gt;&lt;/td&gt;&lt;/tr&gt;
&lt;tr&gt;&lt;td class=&quot;diff-marker&quot;&gt;&lt;/td&gt;&lt;td style=&quot;background-color: #f8f9fa; color: #202122; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #eaecf0; vertical-align: top; white-space: pre-wrap;&quot;&gt;&lt;br&gt;&lt;/td&gt;&lt;td class=&quot;diff-marker&quot;&gt;&lt;/td&gt;&lt;td style=&quot;background-color: #f8f9fa; color: #202122; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #eaecf0; vertical-align: top; white-space: pre-wrap;&quot;&gt;&lt;br&gt;&lt;/td&gt;&lt;/tr&gt;
&lt;/table&gt;</summary>
		<author><name>Unknown user</name></author>
	</entry>
	<entry>
		<id>https://lms.onnocenter.or.id/wiki/index.php?title=Forensic_Report:_Examination_Procedures_(en)&amp;diff=71036&amp;oldid=prev</id>
		<title>Unknown user: Created page with &quot;Sure! Here&#039;s the translated text in English while retaining the wiki format:  ==5. Digital Forensic Examination Procedures==  &#039;&#039;&#039;Digital forensic examination procedures&#039;&#039;&#039; are...&quot;</title>
		<link rel="alternate" type="text/html" href="https://lms.onnocenter.or.id/wiki/index.php?title=Forensic_Report:_Examination_Procedures_(en)&amp;diff=71036&amp;oldid=prev"/>
		<updated>2024-10-20T22:36:01Z</updated>

		<summary type="html">&lt;p&gt;Created page with &amp;quot;Sure! Here&amp;#039;s the translated text in English while retaining the wiki format:  ==5. Digital Forensic Examination Procedures==  &amp;#039;&amp;#039;&amp;#039;Digital forensic examination procedures&amp;#039;&amp;#039;&amp;#039; are...&amp;quot;&lt;/p&gt;
&lt;p&gt;&lt;b&gt;New page&lt;/b&gt;&lt;/p&gt;&lt;div&gt;Sure! Here&amp;#039;s the translated text in English while retaining the wiki format:&lt;br /&gt;
&lt;br /&gt;
==5. Digital Forensic Examination Procedures==&lt;br /&gt;
&lt;br /&gt;
&amp;#039;&amp;#039;&amp;#039;Digital forensic examination procedures&amp;#039;&amp;#039;&amp;#039; are a series of systematic steps taken to collect, analyze, and preserve digital evidence from a device or system. The goal is to obtain relevant information for an investigation, whether criminal, civil, or internal corporate.&lt;br /&gt;
&lt;br /&gt;
==5.1 Evidence Receipt==&lt;br /&gt;
* &amp;#039;&amp;#039;&amp;#039;Date and Time of Receipt:&amp;#039;&amp;#039;&amp;#039; Accurate records of when evidence is received are crucial for maintaining the chain of custody and the integrity of the evidence. &lt;br /&gt;
* &amp;#039;&amp;#039;&amp;#039;Condition of Evidence:&amp;#039;&amp;#039;&amp;#039; Document the physical condition of the device (e.g., cracked, damaged, signs of tampering), as well as its power state (on, off).&lt;br /&gt;
* &amp;#039;&amp;#039;&amp;#039;Initial Steps:&amp;#039;&amp;#039;&amp;#039;&lt;br /&gt;
** &amp;#039;&amp;#039;&amp;#039;Documentation:&amp;#039;&amp;#039;&amp;#039; Make detailed notes of all device details, including brand, model, serial number, and included accessories.&lt;br /&gt;
** &amp;#039;&amp;#039;&amp;#039;Photography:&amp;#039;&amp;#039;&amp;#039; Take photos of the device from various angles before and after the examination. This is useful for documenting the initial condition and any changes that occur during the examination process.&lt;br /&gt;
** &amp;#039;&amp;#039;&amp;#039;Video:&amp;#039;&amp;#039;&amp;#039; Record a short video when unpacking the device to visually document the process.&lt;br /&gt;
&lt;br /&gt;
==5.2 Acquisition Process==&lt;br /&gt;
* &amp;#039;&amp;#039;&amp;#039;Acquisition Methods:&amp;#039;&amp;#039;&amp;#039;&lt;br /&gt;
** &amp;#039;&amp;#039;&amp;#039;Live Acquisition:&amp;#039;&amp;#039;&amp;#039; Copying data directly from a device that is currently operational. This method is useful for capturing volatile data (easily lost) such as memory.&lt;br /&gt;
** &amp;#039;&amp;#039;&amp;#039;Static Acquisition:&amp;#039;&amp;#039;&amp;#039; Copying data from a device that has been powered off. This method is more commonly used because it does not disturb the device&amp;#039;s condition.&lt;br /&gt;
** &amp;#039;&amp;#039;&amp;#039;Disk Imaging:&amp;#039;&amp;#039;&amp;#039; Creating a bit-by-bit copy of the entire storage medium. This is the most recommended method to maintain data integrity.&lt;br /&gt;
* &amp;#039;&amp;#039;&amp;#039;Integrity Verification:&amp;#039;&amp;#039;&amp;#039;&lt;br /&gt;
** &amp;#039;&amp;#039;&amp;#039;Hash Value:&amp;#039;&amp;#039;&amp;#039; Calculate the hash value of both the original data and its copy. Compare the two hash values to ensure that the copy made is identical to the original.&lt;br /&gt;
** &amp;#039;&amp;#039;&amp;#039;Checksum:&amp;#039;&amp;#039;&amp;#039; Calculate the checksum of the data to verify data integrity.&lt;br /&gt;
&lt;br /&gt;
==5.3 Data Analysis==&lt;br /&gt;
* &amp;#039;&amp;#039;&amp;#039;Types of Analysis:&amp;#039;&amp;#039;&amp;#039;&lt;br /&gt;
** &amp;#039;&amp;#039;&amp;#039;File System Analysis:&amp;#039;&amp;#039;&amp;#039; Identifying the type of file system used, directory structure, and existing files.&lt;br /&gt;
** &amp;#039;&amp;#039;&amp;#039;Network Analysis:&amp;#039;&amp;#039;&amp;#039; Analyzing network activities previously performed by the device, including IP addresses, ports, and protocols used.&lt;br /&gt;
** &amp;#039;&amp;#039;&amp;#039;Malware Analysis:&amp;#039;&amp;#039;&amp;#039; Searching for the presence of malware, viruses, or other malicious programs.&lt;br /&gt;
** &amp;#039;&amp;#039;&amp;#039;Email Analysis:&amp;#039;&amp;#039;&amp;#039; Analyzing emails present on the device, including email content, attachments, and metadata.&lt;br /&gt;
** &amp;#039;&amp;#039;&amp;#039;Web History Analysis:&amp;#039;&amp;#039;&amp;#039; Analyzing the web browsing history previously conducted.&lt;br /&gt;
* &amp;#039;&amp;#039;&amp;#039;Tools and Techniques:&amp;#039;&amp;#039;&amp;#039;&lt;br /&gt;
** &amp;#039;&amp;#039;&amp;#039;Forensic Tools:&amp;#039;&amp;#039;&amp;#039; Utilizing various forensic software such as EnCase, FTK Imager, Autopsy, and Sleuth Kit.&lt;br /&gt;
** &amp;#039;&amp;#039;&amp;#039;Scripting:&amp;#039;&amp;#039;&amp;#039; Using programming languages like Python to perform more complex analyses.&lt;br /&gt;
&lt;br /&gt;
==5.4 Documentation==&lt;br /&gt;
* &amp;#039;&amp;#039;&amp;#039;Examination Report:&amp;#039;&amp;#039;&amp;#039; Create a detailed report regarding the entire examination process, from evidence receipt to analysis results.&lt;br /&gt;
* &amp;#039;&amp;#039;&amp;#039;Screenshots:&amp;#039;&amp;#039;&amp;#039; Take screenshots of important analysis results.&lt;br /&gt;
* &amp;#039;&amp;#039;&amp;#039;Log:&amp;#039;&amp;#039;&amp;#039; Record all activities conducted during the examination process in a log file.&lt;br /&gt;
* &amp;#039;&amp;#039;&amp;#039;Chain of Custody:&amp;#039;&amp;#039;&amp;#039; Document the chain of custody of the evidence completely, including who held the evidence, when, and where.&lt;br /&gt;
&lt;br /&gt;
&amp;#039;&amp;#039;&amp;#039;Important:&amp;#039;&amp;#039;&amp;#039; The entire examination process must be conducted according to established procedures and forensic ethical standards to maintain evidence integrity and avoid contamination.&lt;br /&gt;
&lt;br /&gt;
&amp;#039;&amp;#039;&amp;#039;Note:&amp;#039;&amp;#039;&amp;#039; The explanation above provides an overview of digital forensic examination procedures. Actual procedures may vary depending on the type of device, operating system, and investigation objectives.&lt;br /&gt;
&lt;br /&gt;
==Interesting Links==&lt;br /&gt;
&lt;br /&gt;
* [[Forensic: IT]]&lt;/div&gt;</summary>
		<author><name>Unknown user</name></author>
	</entry>
</feed>