Step-by-Step Computer Investigation Process in Digital Forensics | Chapter 5 from Learn Computer Forensics by William Oettinger
Step-by-Step Computer Investigation Process in Digital Forensics | Chapter 5 from Learn Computer Forensics by William Oettinger
Digital forensics is not just about recovering data—it's about telling the story behind the data. In Chapter 5 of Learn Computer Forensics (Second Edition), William Oettinger guides readers through the full lifecycle of a computer-based investigation, from planning and acquisition to deep analysis and timeline reconstruction. This chapter gives both aspiring and seasoned investigators a structured approach to uncovering the truth from digital evidence.
📺 Watch the complete chapter breakdown here:
Planning the Investigation
The chapter begins with a discussion on how to approach an investigation:
- Kitchen sink approach: Collect everything, analyze broadly
- Targeted approach: Focus on known scope, specific artifacts, or timeframe
Proper planning helps manage resources, avoid evidence spoliation, and prioritize relevant findings.
Timeline Analysis: Reconstructing Events
Oettinger introduces timeline analysis as a core technique in forensic investigations. This involves:
- Using MAC times (Modified, Accessed, Created) to map user activity
- Creating super timelines that compile multiple data sources for a chronological narrative
- Leveraging tools like X-Ways Forensics, Plaso/log2timeline, and Timeline Explorer
Data sources such as event logs, browser histories, registry hives, and file system logs are key to validating timelines and pinpointing suspicious behavior.
Media Analysis: Digging Through Storage Devices
Oettinger walks through how to examine different forms of media:
- Traditional HDDs, SSDs, USB drives, and optical discs
- Allocated space: Currently used data blocks
- Unallocated space: Previously deleted data that can still be recovered
- Slack space: Unused areas within file clusters that may contain remnants of prior data
- Bad sectors: Potential hiding spots for tampered or hidden data
Keyword Identification Using String Search and Regex
Investigators can extract meaningful patterns and content using:
- String search: Simple keyword-based examination of media
- Regular expressions (regex): Pattern-matching for emails, credit cards, IP addresses, and more
Tools like Autopsy and Plaso help automate and validate these searches.
Recovering Deleted Files: Data Carving Techniques
Oettinger explains how data carving allows forensic analysts to reconstruct deleted or fragmented files:
- Understand allocated vs. unallocated clusters in FAT and NTFS
- Use tools like Plaso and its commands (
pinfo
,psort
,psteal
) for timeline extraction - Recover file fragments from slack space and previously deleted partitions
This process can reveal images, documents, or malware that the suspect attempted to erase.

Real-World Application of the Investigation Process
Oettinger supports his methodology with case examples and tool demonstrations. By the end of the chapter, the reader understands how to:
- Plan and scope an investigation
- Create and analyze forensic timelines
- Search, filter, and extract meaningful evidence from complex file systems
- Use open-source and professional tools to generate admissible reports
Conclusion
Chapter 5 emphasizes that digital investigations are only as strong as their methodology. By combining timeline analysis, media evaluation, and file recovery techniques, forensic investigators can reconstruct digital events with clarity and confidence.
🎓 To see how it all connects, watch the full video summary and learn how to apply these tools in real-world scenarios.
📘 Want more chapters like this? Dive into the full Learn Computer Forensics YouTube playlist from Last Minute Lecture.
If you found this breakdown helpful, be sure to subscribe to Last Minute Lecture for more chapter-by-chapter textbook summaries and academic study guides.
Comments
Post a Comment