Digital Forensics Case B4DM755
TryHackMe Walkthroughs â‹… Guided â‹… Digital Forensics Case B4DM755
Task 1: Introduction
This room simulates a public-sector digital forensics case spanning from evidence collection to court testimony. A court of law has authorized us to conduct a search on a specific person by analyzing artifacts and evidence. In this room, we will:
Ensure proper chain of custody procedures for transporting evidence to the forensics laboratory
Use FTK Imager to acquire a forensic disk image and preserve digital artifacts and evidence
Analyze forensic artifacts received at the forensics laboratory for presentation during a trial in a court of law
Task 2: Case B4DM755: Details of the Crime
Suppose we are a forensic lab analyst whose job is to analyze artifacts from crime scenes.
We have been given the following information about the suspect:
Name: William S. McClean (William Super McClean)
Nationality: British
Charges Pressed: Corporate espionage and theft of trade secrets
Other information: Currently in Metro Manila, Philippines; transaction with incriminating materials will happen today with local gang member
We have been assigned as DFIR first responder and are tasked with appropriately acquiring digital artifacts and evidence. Proper search authority and a search warrant have been obtained.
Task 3: Practical Application of the Digital Forensics Process
DFIR first responders typically follow these steps for computer systems at the scene of a crime:
Take an image of RAM
Check for drive encryption
Take an image of the drive(s)
DFIR first responders should establish a chain of custody while following these best practices:
Ensure proper documentation of seized materials
Hash and copy obtained files
Do not shutdown devices since this can alter data. Pull the power plug instead.
Bag, seal, and tag the obtained artifacts.
drive encryption
Whether the drive is encrypted or not needs to be known before trying to imaging the drive.
hash and copy
Hashing and copying allows we to ensure that the original files have not been modified in any way.
Task 4: Case B4DM755: At the Scene of Crime
Law enforcement arrived at the suspect's residence after the transaction supposedly happened. There were indications that he attempted to eradicate evidence.
Law enforcement officers searched the suspect's residence and discovered a flash drive with an attached key chain. The key chain had the initials WSM and is believed to belong to the suspect.
Task 5: Introduction to FTK Imager
FTK Imager is a forensic tool that allows DFIR professionals to acquire data and perform analysis on a copy of that data. In a real-world setting, a write-blocking device, or write blocker for short, must be used to prevent the original evidence from being modified.
The user interface (UI) of FTK Imager includes three parts:
Evidence tree pane: Displays a hierarchical view of added evidence sources
File list pane: Displays a list of files and folders contained in a selected directory from the evidence tree pane
Viewer pane: Displays the content of selected files
The following scenario emulates a situation where a physical drive, connected to a write blocker, is attached. EFS encryption is a type of filesystem-level encryption provided by Windows on NTFS file systems. We can detect the presence of EFS encryption with the following steps:
Open FTK Imager and go to
File -> Add Evidence Item...
Choose
Physical Drive
as the selected source andMicrosoft Virtual Disk
as the selected drive. ClickFinish
.Go to
File -> Detect EFS Encryption
to see whether there is EFS encryption on the drive.
Task 6: Using FTK Imager to Acquire Digital Artifacts and Evidence
We can create a disk image with the following steps:
Open FTK Imager and go to
File -> Create Disk Image
.Choose
Physical Drive
as the selected source andMicrosoft Virtual Disk
as the selected drive. ClickFinish
.
TODO
TODO
Task 7: Case B4DM755: At the Forensics Laboratory
TODO
Task 8: Post-Analysis of Evidence to Court Proceedings
Law enforcement agencies and DFIR professionals must follow four phases of investigation when investigating a case for court.
Pre-search: Send requests to preserve data of suspect's social media and ISPs, obtain a warrant, and perform inspections of suspect's public information
Search: Perform search, seizure, and examination of digital devices and obtain data from social media networks and ISPs
Post-search: Perform forensic analysis of acquired evidence
Trial: Present forensic evidence with documentation at court
Last updated