HOME LAB : HANDS-ON
- Get link
- X
- Other Apps
- Get link
- X
- Other Apps
Figure 1 Problem Statement |
Figure 2 Forensics Steps |
Table 1 Search & Seize Items
ITEMS |
SERIAL NUMBER |
Desktop Hard disk |
HD01 |
Memory Stick – Black |
MSBLACK01 |
Memory Stick – White |
MSWHITE01 |
Memory Stick – Sliver |
MSSLIVER01 |
Memory Stick – Fujifilm |
MSFUJIFLIM01 |
Sim card – red-white |
SIM01 |
Phone – Black |
PHONEBLACK01 |
CD – white |
CDWHITE01 |
Book – catch-me |
BOOK01 |
Figure 7 Autopsy view 01 |
Table 2 List of Findings
TYPE |
Count |
Image preview |
Comments |
IMAGE FILES |
9 |
7 |
1 as txt file |
DELETED FILES |
5 |
4 |
2 Images Repetitive |
DOC FILE |
1 |
1 |
Contains Image file |
RENAMED EXTENSIONS |
4 |
3 |
2 Image files |
Figure 8 Autopsy Images preview. |
Table 3 Autopsy Images table timeline
IMG link |
Modified Time |
Change Time |
Access Time |
Created Time |
Location |
Comments |
f0000000.jpg |
0000-00-00 00:00:00 |
0000-00-00 00:00:00 |
0000-00-00 00:00:00 |
0000-00-00 00:00:00 |
/img_cwk1.dd/$CarvedFiles/1/f0000000.jpg |
JPG File |
f0000639.jpg |
0000-00-00 00:00:00 |
0000-00-00 00:00:00 |
0000-00-00 00:00:00 |
0000-00-00 00:00:00 |
/img_cwk1.dd/$CarvedFiles/1/f0000639.jpg |
JPG File |
image_0.jpg |
0000-00-00 00:00:00 |
0000-00-00 00:00:00 |
0000-00-00 00:00:00 |
0000-00-00 00:00:00 |
/img_cwk1.dd/misc/file12.doc/image_0.jpg |
JPG File |
file8.jpg |
2004-06-09 21:52:20 BST |
0000-00-00 00:00:00 |
0000-00-00 00:00:00 |
0000-00-00 00:00:00 |
/img_cwk1.dd/archive/file8.zip/file8.jpg |
JPG File |
file9.jpg |
2004-06-09 21:53:32 BST |
0000-00-00 00:00:00 |
0000-00-00 00:00:00 |
0000-00-00 00:00:00 |
/img_cwk1.dd/archive/file9.boo/file9.jpg |
JPG File |
file10.jpg |
2004-06-10 02:54:53 BST |
0000-00-00 00:00:00 |
0000-00-00 00:00:00 |
0000-00-00 00:00:00 |
/img_cwk1.dd/archive/file10.tar.gz/file10.tar/file10.jpg |
JPG File |
file1.jpg |
2004-06-10 07:59:40 BST |
2004-06-10 04:27:36 BST |
2004-06-10 04:27:36 BST |
2004-06-10 04:27:36 BST |
/img_cwk1.dd/alloc/file1.jpg |
JPG file |
file3.jpg |
2004-06-10 08:27:02 BST |
2004-06-10 04:28:20 BST |
2004-06-10 04:28:20 BST |
2004-06-10 04:28:20 BST |
/img_cwk1.dd/invalid/file3.jpg |
No JPG |
"file4.jpg" |
2004-06-10 08:38:06 BST |
2004-06-10 04:28:22 BST |
2004-06-10 04:28:22 BST |
2004-06-10 04:28:20 BST |
/img_cwk1.dd/invalid/file4.jpg |
No JPG |
Table 4 Autopsy Deleted files timeline.
Name |
Modified Time |
Change Time |
Access Time |
Created Time |
Location |
Comments |
f0000000.jpg |
0000-00-00
00:00:00 |
0000-00-00
00:00:00 |
0000-00-00
00:00:00 |
0000-00-00
00:00:00 |
/img_cwk1.dd/$CarvedFiles/1/
f0000000.jpg |
JPG File |
f0000639.jpg |
0000-00-00
00:00:00 |
0000-00-00
00:00:00 |
0000-00-00
00:00:00 |
0000-00-00
00:00:00 |
/img_cwk1.dd/$CarvedFiles/1/
f0000639.jpg |
JPG File |
f0003372.db |
0000-00-00
00:00:00 |
0000-00-00
00:00:00 |
0000-00-00
00:00:00 |
0000-00-00
00:00:00 |
/img_cwk1.dd/$CarvedFiles/1/
f0003372.db |
No JPG |
file6.jpg |
2004-06-10
07:48:08 BST |
2004-06-10
04:28:00 BST |
2004-06-10
04:28:00 BST |
2004-06-10
04:28:00 BST |
/img_cwk1.dd/del1
/file6.jpg |
JPG File |
file7.hmm |
2004-06-10
07:49:18 BST |
2004-06-10
04:43:44 BST |
2004-06-10
04:43:38 BST |
2004-06-10
04:28:00 BST |
/img_cwk1.dd/del2/
file7.hmm |
JPG File |
Table 5 Autopsy Doc timeline
Name |
Modified
Time |
Change
Time |
Access
Time |
Created
Time |
Location
|
Comments
|
file12.doc |
2004-06-10
08:20:58 BST |
2004-06-10
04:29:18 BST |
2004-06-10
04:29:18 BST |
2004-06-10
04:29:17 BST |
/img_cwk1.dd/
misc/file12.doc |
JPG File
|
file5.rtf |
2004-06-10
08:41:54 BST |
2004-06-10
04:28:20 BST |
2004-06-10
04:28:20 BST |
2004-06-10
04:28:20 BST |
/img_cwk1.dd/
invalid/file5.rtf |
No JPG
|
Table 6 Doc Scrubber: Result of file12.doc
File Analyzed: file12.doc
Title:
Author: Brian Carrier
Company:
Keywords:
Subject:
Comments:
Template Used: Normal
Application: Microsoft Word 10.1
Created: 10-06-2004 02:20:00
Last Saved: 10-06-2004 02:20:00
Last Edited By: Brian Carrier
Last Printed:
Page Count: 1
Word Count: 0
Character Count: 0
Revision Count: 1
Total Editing Time (minutes): 0
Unique Identifier (GUID): Not Found.
Recent Hyperlinks List: Not Found.
Revision Log: Found 1 hidden revision(s)
"Brian Carrier" edited file:
"lillet:Users:bcarrier:proj:dftt:8-jpeg-search:files:file12.doc"
|
Figure 9 HEX value for file5.rtf |
Figure 10 Changed HEX value of file5.rtf. |
Table 7 Renamed Files Timeline
Name |
Modified Time |
Change Time |
Access Time |
Created Time |
File Path |
Comments |
file13.dll:here |
2004-06-10 04:29:45 BST |
2004-06-10 04:29:45 BST |
2004-06-10 04:29:45 BST |
2004-06-10 04:29:18 BST |
/img_cwk1.dd/misc/file13.dll:here |
JPG file |
file2.dat |
2004-06-10 07:46:52 BST |
2004-06-10 04:27:36 BST |
2004-06-10 04:27:36 BST |
2004-06-10 04:27:36 BST |
/img_cwk1.dd/alloc/file2.dat |
JPG file |
file9.boo |
2004-06-10 08:17:46 BST |
2004-06-10 04:28:54 BST |
2004-06-10 04:28:54 BST |
2004-06-10 04:28:51 BST |
/img_cwk1.dd/archive/file9.boo |
JPG file |
file3.jpg |
2004-06-10 08:27:02 BST |
2004-06-10 04:28:20 BST |
2004-06-10 04:28:20 BST |
2004-06-10 04:28:20 BST |
/img_cwk1.dd/invalid/file3.jpg |
No JPG |
Table 8 RECORD OF ACTIONS
RECORD OF ACTIONS - FORENSICS INVESTIGATION |
Case
ID
: AXB001 |
Recording Officer
Details :
G1454 |
Date and Time of Recording : 1 July 2004
10:00 Am |
Objectives of the Investigation : Collecting Forensics evidence
of the suspected staff member Brian Carrier |
Actions taken:
1.
Scene Documentation:
a.
Starting the video recording equipment to capture the entire
investigation process.
2.
Taking photographs-
a.
of the table, under the table, Front & back of the desktop
unit
b.
of the monitor screen, opening the minimized windows and taking
photos.
3.
Capturing Volatile memory:
a.
Using the Volatility Workbench is v3.0.1006: GUI For Volatility
Framework tool.
b.
Following the steps to create a memory dump on Windows,
c.
run SYSDM.CPL– System Properties >> Advanced >>
Settings >> Complete Memory Dump
4.
Forensic Imaging:
a.
Reference the Forensics Image Creation Steps section [IMAGE ACQUISITION:].
5.
Items Seized:
a.
The items are identified on the table and are provided the
respective serial number and labelled, same can be identified in
search and seize section and CHAIN OF CUSTODY FORM
6.
Analysis Steps:
a.
Analyss steps involved are captured in the section [ANALYSIS:].
7.
Reporting: refer to
a.
RECORD OF ACTIONS
b.
CHAIN OF CUSTODY RECORD
c.
GENERAL CASE DOCUMENTATION
d.
PROCESS DOCUMENTATION
8.
Ending the video recording equipment that was capturing the
entire investigation process. |
Signature: G1454 |
Date and End Time: 1 July 2004 05:00 Pm |
Figure 11 Chain of Custody label |
Figure 12 Email for Authorization |
Table 9 AXB Organization Fair Usage policy
Policy: AXB Organization Fair Usage policy |
Effective Date: 1 April 2003 |
|
1. Purpose
This policy is designed to establish guidelines for the use of
organizational resources.
2. Scope:
This policy applies to all staff members of AXB Organization and
governs the use of organizational resources for creating, storing,
searching the web for, or disseminating pictures of geometric
shapes.
3. Prohibited Activities:
Staff members are expressly prohibited from engaging in the
following activities:
a. Creating, storing, or disseminating pictures of geometric
shapes using AXB organizational resources without explicit
authorization.
b. Searching the web for geometric shapes that are not directly
related to work responsibilities.
4. Monitoring and Reporting:
AXB Organization reserves the right to monitor organizational
resources for compliance with this policy. Any employee found in
violation will be reported to the appropriate authorities for
further investigation.
1.
Enforcement
AXB Information Technology department will be responsible for
enforcing this policy. The IT department will have the authority
to audit employee computer activity and to confiscate or disable
any equipment that is being used in violation of this policy.
Revisions
This policy may be revised from time to time. AXB employees will
be notified of any changes to this policy. |
||
Approved Date: 31 March 2003 |
Approved By: HR Head |
Figure 13 FTK tool Step 01 |
|
|
Figure 15 FTK tool Step 03 |
Figure 20 Autopsy Images section. |
Figure 21 Autopsy images preview |
Figure 22 Autopsy Deleted files. |
Figure 23 Autopsy Extn. Mismatch |
Figure 31 image_0.jpg |
Figure 32 "file13.dll:here" |
Figure 33 file3.jpg |
Figure 34 "file4.jpg" |
Figure 35 Autopsy "file12.doc" |
Figure 36 "file12.doc- image preview |
Figure 37 Doc Scrubber Step01 |
Figure 38 Doc Scrubber Step01 |
Figure 39 Doc Scrubber Step01 |
Comments
Post a Comment