Cyber Forensics: PC
COMPUTER FORENSICS: PC
DISCLAIMER:
- This document contains unedited notes and has not been formally proofread.
- The information provided in this document is intended to provide a basic understanding of certain technologies.
- Please exercise caution when visiting or downloading from websites mentioned in this document and verify the safety of the website and software.
- Some websites and software may be flagged as malware by antivirus programs.
- The document is not intended to be a comprehensive guide and should not be relied upon as the sole source of information.
- The document is not a substitute for professional advice or expert analysis and should not be used as such.
- The document does not constitute an endorsement or recommendation of any particular technology, product, or service.
- The reader assumes all responsibility for their use of the information contained in this document and any consequences that may arise.
- The author disclaim any liability for any damages or losses that may result from the use of this document or the information contained therein.
- The author reserve the right to update or change the information contained in this document at any time without prior notice.
- Any attempts to perform penetration testing or ethical hacking on systems or networks should be done with the explicit permission of the system/network owner. Unauthorized access is illegal and can result in serious legal consequences.
- It is important to fully understand the scope of the testing and to only test within that scope. Testing outside the agreed upon scope is considered unauthorized and may result in legal action.
- Any findings or vulnerabilities discovered during testing should be reported to the system/network owner immediately and kept confidential until a fix can be implemented.
- It is recommended to use a separate, dedicated testing environment rather than testing on a live production system to minimize the risk of accidentally causing damage or downtime.
- It is important to take steps to protect your own identity and prevent accidental data leaks or exposure of sensitive information during testing.
- It is also recommended to follow a standard code of ethics for ethical hacking and penetration testing.
ACKNOWLEDGEMENT
ABBREVIATIONS
Table of Contents
TABLE OF FIGURES
LIST OF TABLES
INTRODUCTION
|
|
| Figure 1 Problem Statement |
|
|
| Figure 2 Forensics Steps |
1. SEARCH AND SEIZE:
1.1. Items Seized after search:
Table 1 Search & Seize Items
|
ITEMS |
SERIAL NUMBER |
|
Desktop Hard disk |
HD01 |
|
Memory Stick – Black |
MSBLACK01 |
|
Memory Stick – White |
MSWHITE01 |
|
Memory Stick – Sliver |
MSSLIVER01 |
|
Memory Stick – Fujifilm |
MSFUJIFLIM01 |
|
Sim card – red-white |
SIM01 |
|
Phone – Black |
PHONEBLACK01 |
|
CD – white |
CDWHITE01 |
|
Book – catch-me |
BOOK01 |
2. IMAGE ACQUISITION:
2.1. Forensics Image Creation Steps
3. ANALYSIS:
3.1. Analysis: Autopsy
|
|
|
Figure 7 Autopsy view 01 |
3.2. Analysis: Listing Findings
Table 2 List of Findings
|
TYPE |
Count |
Image preview |
Comments |
|
IMAGE FILES |
9 |
7 |
1 as txt file |
|
DELETED FILES |
5 |
4 |
2 Images Repetitive |
|
DOC FILE |
1 |
1 |
Contains Image file |
|
RENAMED EXTENSIONS |
4 |
3 |
2 Image files |
|
|
| Figure 8 Autopsy Images preview. |
4. EVIDENCE REPORTING:
4.1. Image Timeline: Created
Table 3 Autopsy Images table timeline
|
IMG link |
Modified Time |
Change Time |
Access Time |
Created Time |
Location |
Comments |
|
f0000000.jpg |
0000-00-00 00:00:00 |
0000-00-00 00:00:00 |
0000-00-00 00:00:00 |
0000-00-00 00:00:00 |
/img_cwk1.dd/$CarvedFiles/1/f0000000.jpg |
JPG File |
|
f0000639.jpg |
0000-00-00 00:00:00 |
0000-00-00 00:00:00 |
0000-00-00 00:00:00 |
0000-00-00 00:00:00 |
/img_cwk1.dd/$CarvedFiles/1/f0000639.jpg |
JPG File |
|
image_0.jpg |
0000-00-00 00:00:00 |
0000-00-00 00:00:00 |
0000-00-00 00:00:00 |
0000-00-00 00:00:00 |
/img_cwk1.dd/misc/file12.doc/image_0.jpg |
JPG File |
|
file8.jpg |
2004-06-09 21:52:20 BST |
0000-00-00 00:00:00 |
0000-00-00 00:00:00 |
0000-00-00 00:00:00 |
/img_cwk1.dd/archive/file8.zip/file8.jpg |
JPG File |
|
file9.jpg |
2004-06-09 21:53:32 BST |
0000-00-00 00:00:00 |
0000-00-00 00:00:00 |
0000-00-00 00:00:00 |
/img_cwk1.dd/archive/file9.boo/file9.jpg |
JPG File |
|
file10.jpg |
2004-06-10 02:54:53 BST |
0000-00-00 00:00:00 |
0000-00-00 00:00:00 |
0000-00-00 00:00:00 |
/img_cwk1.dd/archive/file10.tar.gz/file10.tar/file10.jpg |
JPG File |
|
file1.jpg |
2004-06-10 07:59:40 BST |
2004-06-10 04:27:36 BST |
2004-06-10 04:27:36 BST |
2004-06-10 04:27:36 BST |
/img_cwk1.dd/alloc/file1.jpg |
JPG file |
|
file3.jpg |
2004-06-10 08:27:02 BST |
2004-06-10 04:28:20 BST |
2004-06-10 04:28:20 BST |
2004-06-10 04:28:20 BST |
/img_cwk1.dd/invalid/file3.jpg |
No JPG |
|
"file4.jpg" |
2004-06-10 08:38:06 BST |
2004-06-10 04:28:22 BST |
2004-06-10 04:28:22 BST |
2004-06-10 04:28:20 BST |
/img_cwk1.dd/invalid/file4.jpg |
No JPG |
4.2. Image Timeline: Deleted
Table 4 Autopsy Deleted files timeline.
|
Name |
Modified Time |
Change Time |
Access Time |
Created Time |
Location |
Comments |
|
f0000000.jpg |
0000-00-00
00:00:00 |
0000-00-00
00:00:00 |
0000-00-00
00:00:00 |
0000-00-00
00:00:00 |
/img_cwk1.dd/$CarvedFiles/1/
f0000000.jpg |
JPG File |
|
f0000639.jpg |
0000-00-00
00:00:00 |
0000-00-00
00:00:00 |
0000-00-00
00:00:00 |
0000-00-00
00:00:00 |
/img_cwk1.dd/$CarvedFiles/1/
f0000639.jpg |
JPG File |
|
f0003372.db |
0000-00-00
00:00:00 |
0000-00-00
00:00:00 |
0000-00-00
00:00:00 |
0000-00-00
00:00:00 |
/img_cwk1.dd/$CarvedFiles/1/
f0003372.db |
No JPG |
|
file6.jpg |
2004-06-10
07:48:08 BST |
2004-06-10
04:28:00 BST |
2004-06-10
04:28:00 BST |
2004-06-10
04:28:00 BST |
/img_cwk1.dd/del1
/file6.jpg |
JPG File |
|
file7.hmm |
2004-06-10
07:49:18 BST |
2004-06-10
04:43:44 BST |
2004-06-10
04:43:38 BST |
2004-06-10
04:28:00 BST |
/img_cwk1.dd/del2/
file7.hmm |
JPG File |
4.3. Doc Timeline: Created
Table 5 Autopsy Doc timeline
|
Name |
Modified
Time |
Change
Time |
Access
Time |
Created
Time |
Location
|
Comments
|
|
file12.doc |
2004-06-10
08:20:58 BST |
2004-06-10
04:29:18 BST |
2004-06-10
04:29:18 BST |
2004-06-10
04:29:17 BST |
/img_cwk1.dd/
misc/file12.doc |
JPG File
|
|
file5.rtf |
2004-06-10
08:41:54 BST |
2004-06-10
04:28:20 BST |
2004-06-10
04:28:20 BST |
2004-06-10
04:28:20 BST |
/img_cwk1.dd/
invalid/file5.rtf |
No JPG
|
Table 6 Doc Scrubber: Result of file12.doc
|
File Analyzed: file12.doc
Title:
Author: Brian Carrier
Company:
Keywords:
Subject:
Comments:
Template Used: Normal
Application: Microsoft Word 10.1
Created: 10-06-2004 02:20:00
Last Saved: 10-06-2004 02:20:00
Last Edited By: Brian Carrier
Last Printed:
Page Count: 1
Word Count: 0
Character Count: 0
Revision Count: 1
Total Editing Time (minutes): 0
Unique Identifier (GUID): Not Found.
Recent Hyperlinks List: Not Found.
Revision Log: Found 1 hidden revision(s)
"Brian Carrier" edited file:
"lillet:Users:bcarrier:proj:dftt:8-jpeg-search:files:file12.doc"
|
|
|
|
Figure 9 HEX value for file5.rtf |
|
|
| Figure 10 Changed HEX value of file5.rtf. |
4.4. Files renamed Timeline:
Table 7 Renamed Files Timeline
|
Name |
Modified Time |
Change Time |
Access Time |
Created Time |
File Path |
Comments |
|
file13.dll:here |
2004-06-10 04:29:45 BST |
2004-06-10 04:29:45 BST |
2004-06-10 04:29:45 BST |
2004-06-10 04:29:18 BST |
/img_cwk1.dd/misc/file13.dll:here |
JPG file |
|
file2.dat |
2004-06-10 07:46:52 BST |
2004-06-10 04:27:36 BST |
2004-06-10 04:27:36 BST |
2004-06-10 04:27:36 BST |
/img_cwk1.dd/alloc/file2.dat |
JPG file |
|
file9.boo |
2004-06-10 08:17:46 BST |
2004-06-10 04:28:54 BST |
2004-06-10 04:28:54 BST |
2004-06-10 04:28:51 BST |
/img_cwk1.dd/archive/file9.boo |
JPG file |
|
file3.jpg |
2004-06-10 08:27:02 BST |
2004-06-10 04:28:20 BST |
2004-06-10 04:28:20 BST |
2004-06-10 04:28:20 BST |
/img_cwk1.dd/invalid/file3.jpg |
No JPG |
4.5. Evidence conclusion
5. PARALLEL REPORTS:
5.1. RECORD OF ACTIONS
Table 8 RECORD OF ACTIONS
|
RECORD OF ACTIONS - FORENSICS INVESTIGATION |
|
Case
ID
: AXB001 |
|
Recording Officer
Details :
G1454 |
|
Date and Time of Recording : 1 July 2004
10:00 Am |
|
Objectives of the Investigation : Collecting Forensics evidence
of the suspected staff member Brian Carrier |
|
Actions taken:
1.
Scene Documentation:
a.
Starting the video recording equipment to capture the entire
investigation process.
2.
Taking photographs-
a.
of the table, under the table, Front & back of the desktop
unit
b.
of the monitor screen, opening the minimized windows and taking
photos.
3.
Capturing Volatile memory:
a.
Using the Volatility Workbench is v3.0.1006: GUI For Volatility
Framework tool.
b.
Following the steps to create a memory dump on Windows,
c.
run SYSDM.CPL– System Properties >> Advanced >>
Settings >> Complete Memory Dump
4.
Forensic Imaging:
a.
Reference the Forensics Image Creation Steps section [IMAGE ACQUISITION:].
5.
Items Seized:
a.
The items are identified on the table and are provided the
respective serial number and labelled, same can be identified in
search and seize section and CHAIN OF CUSTODY FORM
6.
Analysis Steps:
a.
Analyss steps involved are captured in the section [ANALYSIS:].
7.
Reporting: refer to
a.
RECORD OF ACTIONS
b.
CHAIN OF CUSTODY RECORD
c.
GENERAL CASE DOCUMENTATION
d.
PROCESS DOCUMENTATION
8.
Ending the video recording equipment that was capturing the
entire investigation process. |
|
Signature: G1454 |
|
Date and End Time: 1 July 2004 05:00 Pm |
5.2. CHAIN OF CUSTODY RECORD
|
|
| Figure 11 Chain of Custody label |
5.3. GENERAL CASE DOCUMENTATION
|
|
| Figure 12 Email for Authorization |
Table 9 AXB Organization Fair Usage policy
|
Policy: AXB Organization Fair Usage policy |
Effective Date: 1 April 2003 |
|
|
1. Purpose
This policy is designed to establish guidelines for the use of
organizational resources.
2. Scope:
This policy applies to all staff members of AXB Organization and
governs the use of organizational resources for creating, storing,
searching the web for, or disseminating pictures of geometric
shapes.
3. Prohibited Activities:
Staff members are expressly prohibited from engaging in the
following activities:
a. Creating, storing, or disseminating pictures of geometric
shapes using AXB organizational resources without explicit
authorization.
b. Searching the web for geometric shapes that are not directly
related to work responsibilities.
4. Monitoring and Reporting:
AXB Organization reserves the right to monitor organizational
resources for compliance with this policy. Any employee found in
violation will be reported to the appropriate authorities for
further investigation.
1.
Enforcement
AXB Information Technology department will be responsible for
enforcing this policy. The IT department will have the authority
to audit employee computer activity and to confiscate or disable
any equipment that is being used in violation of this policy.
Revisions
This policy may be revised from time to time. AXB employees will
be notified of any changes to this policy. |
||
|
Approved Date: 31 March 2003 |
Approved By: HR Head |
|
6 PROCESS DOCUMENTATION
7. CONCLUSION
APPENDIX: A
FTK IMAGER LIGHT TOOL SCREENSHOTS:
|
|
| Figure 13 FTK tool Step 01 |
|
|
| Figure 15 FTK tool Step 03 |
APPENDIX: B
AUTOPSY ANALYSIS OF CWK1.DD FORENSICS IMAGE
|
|
| Figure 20 Autopsy Images section. |
|
|
| Figure 21 Autopsy images preview |
|
|
| Figure 22 Autopsy Deleted files. |
|
|
| Figure 23 Autopsy Extn. Mismatch |
|
|
| Figure 31 image_0.jpg |
|
|
| Figure 32 "file13.dll:here" |
|
|
| Figure 33 file3.jpg |
|
|
| Figure 34 "file4.jpg" |
|
|
| Figure 35 Autopsy "file12.doc" |
|
|
| Figure 36 "file12.doc- image preview |
Appendix C:
Doc Scrubber tool [Version1.2]:
|
|
| Figure 37 Doc Scrubber Step01 |
|
|
| Figure 38 Doc Scrubber Step01 |
|
|
| Figure 39 Doc Scrubber Step01 |
Comments
Post a Comment