Digital Forensics Case B4DM755
Task 1: Introduction
This room simulates a public-sector digital forensics case spanning from evidence collection to court testimony. A court of law has authorized us to conduct a search on a specific person by analyzing artifacts and evidence. In this room, we will:
Ensure proper chain of custody procedures for transporting evidence to the forensics laboratory
Use FTK Imager to acquire a forensic disk image and preserve digital artifacts and evidence
Analyze forensic artifacts received at the forensics laboratory for presentation during a trial in a court of law
Task 2: Case B4DM755: Details of the Crime
Suppose we are a forensic lab analyst whose job is to analyze artifacts from crime scenes.
We have been given the following information about the suspect:
Name: William S. McClean (William Super McClean)
Nationality: British
Charges Pressed: Corporate espionage and theft of trade secrets
Other information: Currently in Metro Manila, Philippines; transaction with incriminating materials will happen today with local gang member
We have been assigned as DFIR first responder and are tasked with appropriately acquiring digital artifacts and evidence. Proper search authority and a search warrant have been obtained.
Task 3: Practical Application of the Digital Forensics Process
DFIR first responders typically follow these steps for computer systems at the scene of a crime:
Take an image of RAM
Check for drive encryption
Take an image of the drive(s)
DFIR first responders should establish a chain of custody while following these best practices:
Ensure proper documentation of seized materials
Hash and copy obtained files
Do not shutdown devices since this can alter data. Pull the power plug instead.
Bag, seal, and tag the obtained artifacts.
drive encryption
Whether the drive is encrypted or not needs to be known before trying to imaging the drive.
hash and copy
Hashing and copying allows we to ensure that the original files have not been modified in any way.
Task 4: Case B4DM755: At the Scene of Crime
Law enforcement arrived at the suspect's residence after the transaction supposedly happened. There were indications that he attempted to eradicate evidence.
Law enforcement officers searched the suspect's residence and discovered a flash drive with an attached key chain. The key chain had the initials WSM and is believed to belong to the suspect.
Task 5: Introduction to FTK Imager
FTK Imager is a forensic tool that allows DFIR professionals to acquire data and perform analysis on a copy of that data. In a real-world setting, a write-blocking device, or write blocker for short, must be used to prevent the original evidence from being modified.
The user interface (UI) of FTK Imager includes three parts:
Evidence tree pane: Displays a hierarchical view of added evidence sources
File list pane: Displays a list of files and folders contained in a selected directory from the evidence tree pane
Viewer pane: Displays the content of selected files
The following scenario emulates a situation where a physical drive, connected to a write blocker, is attached. EFS encryption is a type of filesystem-level encryption provided by Windows on NTFS file systems. We can detect the presence of EFS encryption with the following steps:
Open FTK Imager and go to
File -> Add Evidence Item...
Choose "Physical Drive" as the selected source and "Microsoft Virtual Disk" as the selected drive. Click
Finish
.Go to
File -> Detect EFS Encryption
to see whether there is EFS encryption on the drive.
Task 6: Using FTK Imager to Acquire Digital Artifacts and Evidence
We can create a disk image with the following steps:
Open FTK Imager and go to
File -> Create Disk Image
.Choose "Physical Drive" as the selected source and "Microsoft Virtual Disk" as the selected drive. Click
Finish
.Check "Verify images after they are created" and "Create directory listings of all files in the image after they are created" at the bottom of the Create Image window.
Press
Add
to open the Select Image Type window, and choose "Raw (dd)." ClickNext
.Enter case details in the Evidence Item Information window. Click
Next
.Enter the Image Destination Folder and Image Filename. Click
Finish
.Press
Start
to create the forensic disk image.Once the image has been created, check that the cryptographic hashes of the physical drive and the acquired forensic image match.
We can mount the forensic disk image we created with the following steps:
Open FTK Imager and go to
File -> Add Evidence Item
.Choose "Image File" on the Select Source window. Click
Next
.Set "Evidence Source" to the path of the forensic disk image that we created previously. Click
Finish
.
FTK Imager will be populated with our disk image.
Task 7: Case B4DM755: At the Forensics Laboratory
Upon receiving evidence at the Forensics Lab, an analyst should do the following steps:
Verify and document every detail of the Chain of Custody form.
Use FTK Imager to create a forensic disk image of the seized flash drive from the suspect's residence.
Check that the cryptographic hashes of the physical drive and the acquired forensic image match.
Preserve the flash drive after creating an image.
Perform review and analysis on the created forensic disk image.
Document all operations and analysis you do as a forensic analyst
While presenting at trial, ensure that the cryptographic hashes of the physical evidence and the forensic disk image match.
To analyze the files further, I right clicked on the files I wanted to examin in FTK imager and exported the files into a folder.
Task 8: Post-Analysis of Evidence to Court Proceedings
Law enforcement agencies and DFIR professionals must follow four phases of investigation when investigating a case for court.
Pre-search: Send requests to preserve data of suspect's social media and ISPs, obtain a warrant, and perform inspections of suspect's public information
Search: Perform search, seizure, and examination of digital devices and obtain data from social media networks and ISPs
Post-search: Perform forensic analysis of acquired evidence
Trial: Present forensic evidence with documentation at court
Last updated