Digital Forensics Case B4DM755

TryHackMe Walkthroughs â‹… Guided â‹… Digital Forensics Case B4DM755


Task 1: Introduction

This room simulates a public-sector digital forensics case spanning from evidence collection to court testimony. A court of law has authorized us to conduct a search on a specific person by analyzing artifacts and evidence. In this room, we will:

  • Ensure proper chain of custody procedures for transporting evidence to the forensics laboratory

  • Use FTK Imager to acquire a forensic disk image and preserve digital artifacts and evidence

  • Analyze forensic artifacts received at the forensics laboratory for presentation during a trial in a court of law

Task 2: Case B4DM755: Details of the Crime

Suppose we are a forensic lab analyst whose job is to analyze artifacts from crime scenes.

We have been given the following information about the suspect:

  • Name: William S. McClean (William Super McClean)

  • Nationality: British

  • Charges Pressed: Corporate espionage and theft of trade secrets

  • Other information: Currently in Metro Manila, Philippines; transaction with incriminating materials will happen today with local gang member

We have been assigned as DFIR first responder and are tasked with appropriately acquiring digital artifacts and evidence. Proper search authority and a search warrant have been obtained.

What is your official role?

forensic lab analyst

As noted above, our official role is our job title: forensic lab analyst.

What role was assigned to you for this specific scenario?

DFIR first responder

In this specific scenario, we are acting as a DFIR first responder.

What do you have to gather?

digital artfacts and evidence

As a DFIR first responder, we are responsible for gathering digital artifacts and evidence that will be analyzed and possibly used in court.

Task 3: Practical Application of the Digital Forensics Process

DFIR first responders typically follow these steps for computer systems at the scene of a crime:

  1. Take an image of RAM

  2. Check for drive encryption

  3. Take an image of the drive(s)

DFIR first responders should establish a chain of custody while following these best practices:

  • Ensure proper documentation of seized materials

  • Hash and copy obtained files

  • Do not shutdown devices since this can alter data. Pull the power plug instead.

  • Bag, seal, and tag the obtained artifacts.

Before imaging drives, what must we check them for?

drive encryption

Whether the drive is encrypted or not needs to be known before trying to imaging the drive.

What should be done to ensure and maintain the integrity of original files in the Chain of Custody?

hash and copy

Hashing and copying allows we to ensure that the original files have not been modified in any way.

What must be done before sending obtained artefacts to the Forensics Laboratory?

bag, seal, and tag the obtained artefacts

Artifacts need to be secured and labeled before being sent to a different location.

Task 4: Case B4DM755: At the Scene of Crime

Law enforcement arrived at the suspect's residence after the transaction supposedly happened. There were indications that he attempted to eradicate evidence.

Law enforcement officers searched the suspect's residence and discovered a flash drive with an attached key chain. The key chain had the initials WSM and is believed to belong to the suspect.

What is the only possible artefact found in the suspect's residence?

flash drive

As noted above, law enforcement officers discovered a flash drive with an attached keychain.

Based on the scenario and the previous task, what should be done with that acquired suspect artefact?

taking an image

Once an artifact has been transported to the laboratory, a professional should take an image for analysis.

What is the crucial aspect of the Chain of Custody that ensures individual accountability and guarantees a transparent and untainted transfer of artefacts and evidence?ensure proper documentationArtifacts and evidence must be properly documented so that we can ensure they were not tampered with.

Task 5: Introduction to FTK Imager

FTK Imager is a forensic tool that allows DFIR professionals to acquire data and perform analysis on a copy of that data. In a real-world setting, a write-blocking device, or write blocker for short, must be used to prevent the original evidence from being modified.

The user interface (UI) of FTK Imager includes three parts:

  • Evidence tree pane: Displays a hierarchical view of added evidence sources

  • File list pane: Displays a list of files and folders contained in a selected directory from the evidence tree pane

  • Viewer pane: Displays the content of selected files

The following scenario emulates a situation where a physical drive, connected to a write blocker, is attached. EFS encryption is a type of filesystem-level encryption provided by Windows on NTFS file systems. We can detect the presence of EFS encryption with the following steps:

  1. Open FTK Imager and go to File -> Add Evidence Item...

  2. Choose Physical Drive as the selected source and Microsoft Virtual Disk as the selected drive. Click Finish.

  3. Go to File -> Detect EFS Encryption to see whether there is EFS encryption on the drive.

What device will prevent tampering when acquiring a forensic disk image?

write-blocking device

A write-blocking device prevents the original evidence from being written to, which would compromise the evidence's integrity.

What is the UI element of FTK Imager which displays a hierarchical view of the added evidence sources?

evidence tree pane

The evidence tree pane displays a hierarchical view of added evidence sources.

Is the attached flash drive encrypted? (Y/N)

N

After following the steps above, FTK Imager indicates that no EFS encryption was detected.

What is the UI element of FTK Imager which displays a list of files and folders?

file list pane

The file list pane displays a list of files and folders contained in a selected directory from the evidence tree pane.

Task 6: Using FTK Imager to Acquire Digital Artifacts and Evidence

We can create a disk image with the following steps:

  1. Open FTK Imager and go to File -> Create Disk Image.

  2. Choose Physical Drive as the selected source and Microsoft Virtual Disk as the selected drive. Click Finish.

TODO

What is the UI element of FTK Imager which displays the content of selected files?

viewer pane

The viewer pane displays the content of selected files.

What is the SHA1 hash of the physical drive and forensic image?

d82f393a67c6fc87a023b50c785a7247ab1ac395

TODO

TODO

Including hidden files, how many files are currently stored on the flash drive?

TODO (ignore ones with an X on the icon and other icon values)

How many files were deleted in total?

6

TODO (note 14 - 8)

How many recovered files are corrupted (e.g., 0 file size)?

Task 7: Case B4DM755: At the Forensics Laboratory

TODO

Aside from FTK Imager, what is the directory name of the other tool located in the tools directory under Desktop?

What is the visible extension of the "hideout" file?

View the metadata of the "hideout" file. What is its actual extension?

A phone was used to photograph the "hideout". What is the phone's model?

A phone was used to photograph the "warehouse". What is the phone's model?

Are there any indications that the suspect is involved in other illegal activity? (Y/N)

Who was the point of contact of Mr William S. McClean in 2022?

A meetup occurred in 2022. What are the GPS coordinates during that time?

What is the password to extract the contents of pandorasbox.zip?

From which company did the source code in the pandorasbox directory originate?

In one of the documents that the suspect has yet to sign, who was listed as the beneficiary?

What is the hidden flag?

Task 8: Post-Analysis of Evidence to Court Proceedings

Law enforcement agencies and DFIR professionals must follow four phases of investigation when investigating a case for court.

  1. Pre-search: Send requests to preserve data of suspect's social media and ISPs, obtain a warrant, and perform inspections of suspect's public information

  2. Search: Perform search, seizure, and examination of digital devices and obtain data from social media networks and ISPs

  3. Post-search: Perform forensic analysis of acquired evidence

  4. Trial: Present forensic evidence with documentation at court

In which phase is a warrant obtained for search, seizure, and examination of the suspect's computer data due to violations of domestic and international laws?

pre-search

A warrant must be obtained before performing any searches or seizing any evidence. Thus, obtaining a warrant occurs in the pre-search phase.

In which phase is a forensic analysis performed on the acquired digital evidence requested from various sources?

post-search

The post-search phase is when analysis of acquired digital evidence is performed.

Which phase involves presenting forensic artefacts and evidence with proper documentation in a court of law?

trial

Forensic evidence with documentation are presented in court during the trial phase.


Last updated