
Forensic investigation steps should be well known because it can open new doors for people to be blamed for easy reasons. It's easier to leave or delete evidence in virtual environments.
Computer Forensics investigation is a process and it has 4 main ways.
Definition
Examination
Analysis
Reporting
Definition
Forensic Informatics review identification period begins with the identification and collection of potential data storage resources (digital evidence) to be examined.
Typical data sources: computer hard drives, CD, DVD, USB disks, flash disks, memory cards, mobile phones. etc.
Examination
It is the research process to make exact copies of the collected data sources. It is essential that the evidence examined here preserves data integrity. In other words, the proof should be preserved from the moment the evidence is seized.
Analysis
in this process, the data about the subject is extracted from the exact copy of the examined evidence.
Reporting
The information is presented. The reporting should be clear and should include evaluations rather than claims.

Hardware and Software Used in Examinations
Encase Forensic Software
It's one of the most used software in the world. It's paid software commercially released by the company Guidance Software and it runs on windows
With Encase Forensic software;
In addition to e-evidence such as hard disk, usb memory, RAM, file, folder, server; Forensic copies of smartphones and tablets can be taken and examined,
It can calculate hash on e-evidence and forensic copy,
It can recover data,
It can work with the password finding/cracking software called "Passware Kit Forensic"
It can show the e-mail content without the need for an external program
In addition to previewing files with various extensions, external file viewers can also be added to the program.
Forensic Toolkit (FTK) software
It is a paid software commercially released by AccessData Software company.
With Forensic Toolkit software
Password of more than 100 applications can be recovered,
Automatic analysis can be done,
Control options such as stopping, pausing and resuming ongoing processes are available
Editable reports,
Comprehensive data analysis,
It is designed in such a way that the operations on the database will continue non-stop in case the FTK program stops working with an error
SQLite database
It has the ability to find/crack passwords of encrypted domains such as Credant, SafeBoot, Utimaco, SafeGuard Enterprise and Easy, EFS, PGP, GuardianEdge, Pointsec and S/MIME.
Cellebrite UFED Touch Ultimate
it receives suitable data from gps devices, tablets, computers, sim cards and some music players for forensic examination
if it supports the model:
it can get physical forensic copy
it can get logical forensic copy
it can extract the current file content,
it can extract files such as existing or deleted applications, passwords, e-mails, messages, contacts, gps information etc.
XRY
XRY hardware can be used with the program installed on the Windows
with the XRY, content extraction can be performed on the model which have 3 different inputs at the same time.
Source: https://www.turkhackteam.org/adli-bi...azilimlar.html
Translator @Gauloran