Sophie Chen
ResumeLinkedInGitHubBluesky
Work
Work
  • Work
  • Digital Forensics Lab
    • 1 Setting Up
    • 2 Basic Computer Skills for Digital Forensics
      • 2.1 Number Systems
      • 2.2 PC Introduction
      • 2.3 Windows Command Line Tutorial
      • 2.4 Linux Command Line Tutorial
      • 2.5 Advanced Linux Command Line Tutorial
    • 3 Basic Networking Skills for Digital Forensics
      • 3.1 HTTP Analysis using Wireshark 1
      • 3.2 HTTP Analysis using Wireshark 2
      • 3.3 SYN Flood Attack Investigation using tshark
      • 3.4 SMTP Forensics
      • 3.5 ARP Poisoning Forensics
      • 3.6 Firewall
      • 3.7 DNS Introduction
      • 3.8 DNS Spoofing Forensics
      • 3.9 WEP40 Wireless Aircrack
    • 4 Computer and Digital Forensics
      • 4.1 Introduction to Digital Forensics
      • 4.2 Sleuth Kit Tutorial
      • 4.3 USB Image Acquisition
      • 4.4 Evidence Search - A Pattern Match Game
      • 4.5 Evidence Search - File Metadata
      • 4.6 Data Carving
      • 4.7 Steganography
      • 4.8 Forensic Report Template
    • 5 Computer Forensics Case Studies
      • 5.1 Investigating NIST Data Leakage
        • 5.1.1 Environment Setting Up
        • 5.1.2 Windows Registry
        • 5.1.3 Windows Event and XML
        • 5.1.4 Web History and SQL
        • 5.1.5 Email Investigation
        • 5.1.6 File Change History and USN Journal
        • 5.1.7 Network Evidence and shellbag
        • 5.1.8 Network Drive and Cloud
        • 5.1.9 Master File Table ($MFT) and Log File ($logFile) Analysis
        • 5.1.10 Windows Search History
        • 5.1.11 Windows Volume Shadow Copy Analysis/SQL database carving
        • 5.1.12 Recycle Bin and Anti-Forensics
        • 5.1.13 Data Carving
        • 5.1.14 Crack Windows Passwords
      • 5.2 Investigating P2P Data Leakage
        • 5.2.1 Lab Environment Setting Up
        • 5.2.2 Disk Image and Partitions
        • 5.2.3 Windows Registry and File Directory
        • 5.2.4 MFT Timeline
        • 5.2.5 USN Journal Timeline
        • 5.2.6 uTorrent Log File
        • 5.2.7 File Signature
        • 5.2.8 Emails
        • 5.2.9 Web History
        • 5.2.10 Website Analysis
        • 5.2.11 Timeline (Summary)
      • 5.3 Investigating Illegal Possession of Images
        • 5.3.1 Review HTTP Analysis using Wireshark (text)
        • 5.3.2 Rhion Possession Investigation 1: File recovering
        • 5.3.3 Rhion Possession Investigation 2: Steganography
        • 5.3.4 Rhion Possession Investigation 3: Extract Evidence from FTP Traffic
        • 5.3.5 Rhion Possession Investigation 4: Extract Evidence from HTTP Traffic
      • 5.4 Investigating Email Harassment
        • 5.4.1 Investigating Harassment Email using Wireshark
        • 5.4.2 t-shark Forensic Introduction
        • 5.4.3 Investigating Harassment Email using t-shark
      • 5.5 Investigating Illegal File Transferring
      • 5.6 Investigating Hacking Case
      • 5.7 Investigating Morris Worm Attack
        • 5.7.1 Morris Worm Attack
        • 5.7.2 Investigating Morris Worm Attack
    • 6 Mobile/IoT Forensics Case Studies
      • 6.1 Investigating Echo Show 8
        • 6.1.1 Echo Show Introduction
        • 6.1.2 Echo Show Evidence Planting
        • 6.1.3 Device Teardown and eMMC Chip-off
        • 6.1.4 Image Acquisition and Mounting
        • 6.1.5 Specifications: Device and OS Info
        • 6.1.6 Specifications: User Info
        • 6.1.7 Specifications: Network Connectivity Info
        • 6.1.8 Web Activity
        • 6.1.9 Phone Communication
        • 6.1.10 Multimedia: Photos and related Data
        • 6.1.11 Multimedia: Videos and related Data
        • 6.1.12 Multimedia: Audio and related Data
      • 6.2 Investigating Android 10
        • 6.2.1 Intro Pixel 3
        • 6.2.2 Pixel 3 Image
        • 6.2.3 Pixel 3 Device
        • 6.2.4 Pixel 3 System Setting
        • 6.2.5 Overview: App Life Cycle
        • 6.2.6 AOSP App Investigations: Messaging
        • 6.2.7 AOSP App Investigations: Contacts
        • 6.2.8 AOSP App Investigations: Calendar
        • 6.2.9 GMS App Investigations: Messaging
        • 6.2.10 GMS App Investigations: Dialer
        • 6.2.11 GMS App Investigations: Maps
        • 6.2.12 GMS App Investigations: Photos
        • 6.2.13 Third-Party App Investigations: Kik
        • 6.2.14 Third-Party App Investigations: textnow
        • 6.2.15 Third-Party App Investigations: whatapp
        • 6.2.16 Pixel 3 Rooting
      • 6.3 Investigating iPhone iOS 13.4.1
        • 6.3.1 Intro Intro iPhone iOS 13
        • 6.3.2 iOS 13.4.1 Image
        • 6.3.3 iPhone Device Investigation
        • 6.3.4 iOS System Settings
        • 6.3.5 Overview of App Life Cycle
        • 6.3.6 Messages Investigations
        • 6.3.7 Contacts Investigations
        • 6.3.8 Calendar Investigations
        • 6.3.9 Safari Investigations
        • 6.3.10 Photo Investigations
        • 6.3.11 KnowledgeC Investigations
        • 6.3.12 Health Investigations
        • 6.3.13 Location Investigations
        • 6.3.14 Cellebrite Investigations
        • 6.3.15 Magnet Axiom Investigations
        • 6.3.16 Jailbreak Investigations
      • 6.4 Investigating Drone DJI
        • 6.4.1 DJI Mavic Air Mobile
        • 6.4.2 DJI Mavic Air MicroSD Raw
        • 6.4.3 DJI Mavic Air MicroSD Encase Format
  • CTF Walkthroughs
    • Hack The Box
      • Linux Fundamentals
      • Windows Fundamentals
    • TryHackMe
      • Linux Fundamentals Part 1
      • Linux Fundamentals Part 2
      • Linux Fundamentals Part 3
      • Introductory Networking
      • HTTP in Detail
      • DNS in Detail
      • Intro to Cyber Threat Intel
      • Threat Intelligence Tools
      • MAL: Malware Introductory
      • Intro to Digital Forensics
      • Digital Forensics Case B4DM755
  • Multithreaded Network File Server
  • Thread Library
  • Virtual Memory Pager
Powered by GitBook
On this page
  • Task 1: Introduction
  • Task 2: Case B4DM755: Details of the Crime
  • Task 3: Practical Application of the Digital Forensics Process
  • Task 4: Case B4DM755: At the Scene of Crime
  • Task 5: Introduction to FTK Imager
  • Task 6: Using FTK Imager to Acquire Digital Artifacts and Evidence
  • Task 7: Case B4DM755: At the Forensics Laboratory
  • Task 8: Post-Analysis of Evidence to Court Proceedings
  1. CTF Walkthroughs
  2. TryHackMe

Digital Forensics Case B4DM755


Task 1: Introduction

This room simulates a public-sector digital forensics case spanning from evidence collection to court testimony. A court of law has authorized us to conduct a search on a specific person by analyzing artifacts and evidence. In this room, we will:

  • Ensure proper chain of custody procedures for transporting evidence to the forensics laboratory

  • Use FTK Imager to acquire a forensic disk image and preserve digital artifacts and evidence

  • Analyze forensic artifacts received at the forensics laboratory for presentation during a trial in a court of law

Task 2: Case B4DM755: Details of the Crime

Suppose we are a forensic lab analyst whose job is to analyze artifacts from crime scenes.

We have been given the following information about the suspect:

  • Name: William S. McClean (William Super McClean)

  • Nationality: British

  • Charges Pressed: Corporate espionage and theft of trade secrets

  • Other information: Currently in Metro Manila, Philippines; transaction with incriminating materials will happen today with local gang member

We have been assigned as DFIR first responder and are tasked with appropriately acquiring digital artifacts and evidence. Proper search authority and a search warrant have been obtained.

What is your official role?

forensic lab analyst

As noted above, our official role is our job title: forensic lab analyst.

What role was assigned to you for this specific scenario?

DFIR first responder

In this specific scenario, we are acting as a DFIR first responder.

What do you have to gather?

digital artfacts and evidence

As a DFIR first responder, we are responsible for gathering digital artifacts and evidence that will be analyzed and possibly used in court.

What document is needed before performing any legal search?

search warrant

A search warrant authorizes law enforcement officers to investigate the subject and his place of residence.

Task 3: Practical Application of the Digital Forensics Process

DFIR first responders typically follow these steps for computer systems at the scene of a crime:

  1. Take an image of RAM

  2. Check for drive encryption

  3. Take an image of the drive(s)

DFIR first responders should establish a chain of custody while following these best practices:

  • Ensure proper documentation of seized materials

  • Hash and copy obtained files

  • Do not shutdown devices since this can alter data. Pull the power plug instead.

  • Bag, seal, and tag the obtained artifacts.

Before imaging drives, what must we check them for?

drive encryption

Whether the drive is encrypted or not needs to be known before trying to imaging the drive.

What should be done to ensure and maintain the integrity of original files in the Chain of Custody?

hash and copy

Hashing and copying allows we to ensure that the original files have not been modified in any way.

What must be done before sending obtained artefacts to the Forensics Laboratory?

bag, seal, and tag the obtained artefacts

Artifacts need to be secured and labeled before being sent to a different location.

Task 4: Case B4DM755: At the Scene of Crime

Law enforcement arrived at the suspect's residence after the transaction supposedly happened. There were indications that he attempted to eradicate evidence.

Law enforcement officers searched the suspect's residence and discovered a flash drive with an attached key chain. The key chain had the initials WSM and is believed to belong to the suspect.

What is the only possible artefact found in the suspect's residence?

flash drive

As noted above, law enforcement officers discovered a flash drive with an attached keychain.

Based on the scenario and the previous task, what should be done with that acquired suspect artefact?

taking an image

Once an artifact has been transported to the laboratory, a professional should take an image for analysis.

What is the crucial aspect of the Chain of Custody that ensures individual accountability and guarantees a transparent and untainted transfer of artefacts and evidence?ensure proper documentationArtifacts and evidence must be properly documented so that we can ensure they were not tampered with.

Task 5: Introduction to FTK Imager

FTK Imager is a forensic tool that allows DFIR professionals to acquire data and perform analysis on a copy of that data. In a real-world setting, a write-blocking device, or write blocker for short, must be used to prevent the original evidence from being modified.

The user interface (UI) of FTK Imager includes three parts:

  • Evidence tree pane: Displays a hierarchical view of added evidence sources

  • File list pane: Displays a list of files and folders contained in a selected directory from the evidence tree pane

  • Viewer pane: Displays the content of selected files

The following scenario emulates a situation where a physical drive, connected to a write blocker, is attached. EFS encryption is a type of filesystem-level encryption provided by Windows on NTFS file systems. We can detect the presence of EFS encryption with the following steps:

  1. Open FTK Imager and go to File -> Add Evidence Item...

  2. Choose "Physical Drive" as the selected source and "Microsoft Virtual Disk" as the selected drive. Click Finish.

  3. Go to File -> Detect EFS Encryption to see whether there is EFS encryption on the drive.

What device will prevent tampering when acquiring a forensic disk image?

write-blocking device

A write-blocking device prevents the original evidence from being written to, which would compromise the evidence's integrity.

What is the UI element of FTK Imager which displays a hierarchical view of the added evidence sources?

evidence tree pane

The evidence tree pane displays a hierarchical view of added evidence sources.

Is the attached flash drive encrypted? (Y/N)

N

After following the steps above, FTK Imager indicates that no EFS encryption was detected.

What is the UI element of FTK Imager which displays a list of files and folders?

file list pane

The file list pane displays a list of files and folders contained in a selected directory from the evidence tree pane.

Task 6: Using FTK Imager to Acquire Digital Artifacts and Evidence

We can create a disk image with the following steps:

  1. Open FTK Imager and go to File -> Create Disk Image.

  2. Choose "Physical Drive" as the selected source and "Microsoft Virtual Disk" as the selected drive. Click Finish.

  3. Check "Verify images after they are created" and "Create directory listings of all files in the image after they are created" at the bottom of the Create Image window.

  4. Press Add to open the Select Image Type window, and choose "Raw (dd)." Click Next.

  5. Enter case details in the Evidence Item Information window. Click Next.

  6. Enter the Image Destination Folder and Image Filename. Click Finish.

  7. Press Start to create the forensic disk image.

  8. Once the image has been created, check that the cryptographic hashes of the physical drive and the acquired forensic image match.

What is the UI element of FTK Imager which displays the content of selected files?

viewer pane

The viewer pane displays the content of selected files.

What is the SHA1 hash of the physical drive and forensic image?

d82f393a67c6fc87a023b50c785a7247ab1ac395

The hash of the image pops up after the image is created.

We can mount the forensic disk image we created with the following steps:

  1. Open FTK Imager and go to File -> Add Evidence Item.

  2. Choose "Image File" on the Select Source window. Click Next.

  3. Set "Evidence Source" to the path of the forensic disk image that we created previously. Click Finish.

FTK Imager will be populated with our disk image.

Including hidden files, how many files are currently stored on the flash drive?

8

Taking a look at the output in FTK, count the number of items that do not have an X on the icon. Do not include entries with the .FileSlack extension.

How many files were deleted in total?

6

There were 6 icons that had an X on the icon.

How many recovered files are corrupted (e.g., 0 file size)?

3

Three files had a size of 0: condominium.pdf, resortsworld.png, and townhouse.pdf.

Task 7: Case B4DM755: At the Forensics Laboratory

Upon receiving evidence at the Forensics Lab, an analyst should do the following steps:

  • Verify and document every detail of the Chain of Custody form.

  • Use FTK Imager to create a forensic disk image of the seized flash drive from the suspect's residence.

  • Check that the cryptographic hashes of the physical drive and the acquired forensic image match.

  • Preserve the flash drive after creating an image.

  • Perform review and analysis on the created forensic disk image.

  • Document all operations and analysis you do as a forensic analyst

  • While presenting at trial, ensure that the cryptographic hashes of the physical evidence and the forensic disk image match.

To analyze the files further, I right clicked on the files I wanted to examin in FTK imager and exported the files into a folder.

Aside from FTK Imager, what is the directory name of the other tool located in the tools directory under Desktop?

exiftool-12.47

This is the name of the other tool, as named by the directory inside the tools directory on the user Desktop.

What is the visible extension of the "hideout" file?

.png

The hideout file is called "hideout.png."

View the metadata of the "hideout" file. What is its actual extension?

.jpg

I ran the command exiftool hideout.pdf to see the metadata of the file. The file type extension for this file was jpg.

A phone was used to photograph the "hideout". What is the phone's model?

ONEPLUS A6013

The metadata of the file also listed the camera model name as ONEPLUS A6013.

A phone was used to photograph the "warehouse". What is the phone's model?

I ran the command exiftool warehouse.pdf to see the metadata of the file. The camera model name for this file was Mi 9 Lite.

Are there any indications that the suspect is involved in other illegal activity? (Y/N)

Y

I used exiftool to view the metadata of the rest of the files. When I ran exiftool operations.xlsx, I noticed that the file type was listed as a zip file. So, I ran cp operations.xlsx operations.zip and Expand-Archive -LiteralPath operations.zip -DestinationPath operations to unzip the file. Within the unzipped operations directory was a notes.txt file that indicated there was other illegal activity.

Who was the point of contact of Mr William S. McClean in 2022?

Karl Renato Abelardo

I used cat notes.txt to print the contents of the notes file. In the file, the 2022 point of contact is listed as Karl Renato Abelardo.

A meetup occurred in 2022. What are the GPS coordinates during that time?

14°26'25.7"N 120°59'00.8"E

In the notes file, the 2022 GPS coordinates are listed as 14°26'25.7"N 120°59'00.8"E.

What is the password to extract the contents of pandorasbox.zip?

DarkVault$Pandora=DONOTOPEN!K1ngCr1ms0n!

This password was listed at the bottom of notes.txt.

From which company did the source code in the pandorasbox directory originate?

SwiftSpend Financial

I used the Windows File System GUI to unzip pandorasbox. Within the unzipped pandorasbox directory was a directory called HFT_Algorithm. I used cat to view the contents of the main.py script within this directory. The comment at the top of main.py included information about the source code.

In one of the documents that the suspect has yet to sign, who was listed as the beneficiary?

Mr. Giovanni Vittorio DeVentura

This information was included in the pandorasbox directory in the file "UTCL242231 - Capital distribution to the principal beneficiary GVDeVentura.docx."

What is the hidden flag?

THM{sCr0LL_sCr0LL_cL1cK_cL1cK_4TT3NT10N_2_D3T41L5_15_CRUC14L!!}

Within the unzipped pandorasbox directory, I used the command cat DONOTOPEN to get the flag.

Task 8: Post-Analysis of Evidence to Court Proceedings

Law enforcement agencies and DFIR professionals must follow four phases of investigation when investigating a case for court.

  1. Pre-search: Send requests to preserve data of suspect's social media and ISPs, obtain a warrant, and perform inspections of suspect's public information

  2. Search: Perform search, seizure, and examination of digital devices and obtain data from social media networks and ISPs

  3. Post-search: Perform forensic analysis of acquired evidence

  4. Trial: Present forensic evidence with documentation at court

In which phase is a warrant obtained for search, seizure, and examination of the suspect's computer data due to violations of domestic and international laws?

pre-search

A warrant must be obtained before performing any searches or seizing any evidence. Thus, obtaining a warrant occurs in the pre-search phase.

In which phase is a forensic analysis performed on the acquired digital evidence requested from various sources?

post-search

The post-search phase is when analysis of acquired digital evidence is performed.

Which phase involves presenting forensic artefacts and evidence with proper documentation in a court of law?

trial

Forensic evidence with documentation are presented in court during the trial phase.


Last updated 4 months ago

⋅ ⋅

Work
Thoughts
Home