Computer Forensics Assignment 2
Computer Forensics Assignment 2
Amit Sharma
10137743 1
2010
Contents
Contents................................................................................................................. 2
Executive Summary...............................................................................................3
Chain of Custody....................................................................................................5
Running Sheet........................................................................................................7
Report on Findings...............................................................................................22
Investigation Process...........................................................................................31
Investigation Findings..........................................................................................33
Conclusion............................................................................................................41
Executive Summary 3
The main objective of this report is to explain all the procedures and methods for
the computer forensics investigation from the given image i.e. Assignment2.dd.
The main job is to find the Meerkats images which are strictly forbidden.
We have been contacted by the cooperate client who has asked us to examine
the image that they have made of an employee computer system. Employee has
been suspected of accessing images of Meerkats which are strictly prohibited in
terms of use the employee has signed and in the particular jurisdiction may be
against the law.
As we assumed, the seizure has been done properly on the site and they have
followed all the relevant procedures. We also assumed that the VMware caine
has been already installed successfully including all the tools on the host1
computer system to investigate the image Assignment2.dd. All the investigations
have been done on caine VMware.
• First Category show Running Sheet which includes chain of custody, log
events and what/how/where has been done during the forensic
investigation.
• Under second category, all the findings (Images, document files and
videos) were shown.
RAM 1 GB
Chain of Custody 5
Submitting Activity
Assgnmnt2
Email Id of the Investigator [email protected]
Location from Image obtained Edith Cowan Accessed Placed ECU, Forensic Lab
University,
Blackboard
2010-04-20
5:17:24 PM
Witness of Evidence
The document listed above was/were made by the evidence custodian, in presence, on the date indicated above.
Vikas Sharma, Mr I
Srinivas Reddy, Mr S
I AMIT SHARMA hereby, declare that the above given information is correct to the best of my knowledge and
belief.
Amit Sharma
10137743
Running Sheet 7
Log of Events
Sheet Number 1
20- 5:52:1 Hash function is used on the image i.e. To maintain Amit A
April- 3 PM Assignment2.dd the integrity
10 of the image.
MD5 -
0c776f7c1ef092cdb9465fde80f4ea86
SHA1 -
4179cb30780358577c367a9e6e467087
46ddcc53
20- 6:03:0 Again, Hash function is used on the To check the Amit A
May- 7 PM copied image in the virtual machine. Assignment2
10 .dd is not
MD5 - compromise
0c776f7c1ef092cdb9465fde80f4ea86 d while
copying into
SHA1 - 8
the virtual
4179cb30780358577c367a9e6e467087 machine.
46ddcc53Both hash values are same.
Integrity maintained.
20- 6:06:1 Open new case in the Autopsy named Giving the Amit A
May- 1 PM Assgnmnt2. name of the
10 case for
investigating
.
20- 6:06:2 Add host in the autopsy named host1. Name of the Amit A
May- 4 PM computer
10
the image
file in the
9
original state
Sheet Number 2
22- 9:17:5 Start caine, mount the image again To start Amit A
April- 4 AM and start autopsy. analysing the
10 image.
22- 9:19:2 Choose sorter files by type from the To identify the Amit A
April- 4 AM analysis in the autopsy. files and
10 images
22- 9:20:1 Open the output directory under To check the Amit A
April- 2 AM autopsy. All the identified files can be identified files
10 viewed under the given path i.e.
“/var/lib/autopsy/Meerkat_Investigatio
n/host1/output/sorter-vol1/index.html”
22- 9:21:1 Search for any file type such as To check if Amit A
April- 4 AM .jpeg, .gif, .bmp, .doc etc there is any
10 meerkats
images are
available or
not.
22- 9:24:3 Typed “.gif” in the file name search to To find and Amit A
April- 3 AM find any file or document whose examine all
10 extension is .gif. .gif file and
images.
SHA1 -
f395a98bd52754562f1b513298e3547
e6566baed
22- 9:28:5 Typed “.bmp” in the file name search to To find and Amit A
April- 3 AM find any file or document whose examine
10 extension is .bmp. all .bmp file
and images.
22- 9:30:3 Typed “.jpeg” in the file name search to To find and Amit A
April 1 AM find any file or document whose examine all
-10 extension is .jpeg. .jpeg file and
images.
0ca079eca141053f78652dcfc5fe58021
38171d8
11
22- 9:42:2 Image found named “180px- To maintain Amit A
April- 0 AM Suricata[1].jpg” the integrity
10 of the found
Used hash function on it image i.e.
MD5 - 180px-
1fc5c6d96f9994979498d0adb53de2c5 Suricata[1].j
pg.
SHA1 -
88cf4e4005f029adff6f05c8867a142173
b10f97
SHA1 -
88cf4e4005f029adff6f05c8867a142173
b10f97
SHA1 -
76afa691556abed61c25651c896943d2
e279a7ab
SHA1 -
1109b6d97e4c340744e7158de34b1f2fc
9e65bef
SHA1 -
fa21977697c91c5fdabd9d33934563ed7
66eede6
SHA1 -
fa21977697c91c5fdabd9d33934563ed7
66eede6
2045c11
14
SHA1 -
ac5e6412a42e4a05306c4a247ca6f68a5
462642a
22- 11:01: Typed “.zip” in the file name search to To find and Amit A
April 04 AM find any file or document whose examine
-10 extension is .zip. all .zip file
and images.
SHA1 -
27a5460741ab235f8d86644ea9914a8d
5c7eadb6
SHA1 - 8.jpg
2109aba9a0c807af9591d52c9a9e15d6
16
4e43828b
22- 11:41: Typed “.mp4” in the file name search to To find and Amit A
April 37 AM find any file or document whose examine
-10 extension is .mp4. all .mp4 file
and images.
original state
Sheet Number 3
23- 9:20:2 Hash the images again to check the To compare Amit A
April 1 PM integrity. the hash
-10 value with
MD5: the original
0c776f7c1ef092cdb9465fde80f4ea86 image to
SHA1: check
4179cb30780358577c367a9e6e467087 integrity of
46ddcc53 the image.
23- 9:26:5 Typed “.rar” in the file name search to To find and Amit A
April 6 PM find any file or document whose examine
-10 extension is .rar. all .rar file
and images.
SHA1:
25ef4820224699f6a33e2a38d41ba0fb2
18
a9cf620
23- 9:47:1 Typed “.htm” in the file name search to To find and Amit A
April 4 PM find any file or document whose examine
-10 extension is .htm. all .htm file
and images.
SHA1 -
da6fd25750279ec316bf0aa4d1ead3b26
3e9771c
23- 10:10: Typed “.exe” in the file name search to To find for Amit A
April 24 PM find any file or document whose .exe file and
-10 extension is .exe. images.
23- 10:15: Typed “.doc” in the file name search to To find and Amit A
April 02 PM find any file or document whose examine
-10 extension is .doc. all .doc file
and images.
21
End of Part 1 (Running Sheet)
Report on Findings 22
The aim of this report is to explain about all the findings from the image i.e.
Assignment2.dd during the forensics investigation. The main job is to find the
Meerkats images which are against the law and employee has been suspected of
accessing these images.
Directory Path Hash Values Written Accesse Output of the Name Sig
d Image of the n
MD5 & SHA1 Image
Directory Path Hash Values Written Accesse Output of the Name Sig
d Image of the n
MD5 & SHA1 Image
SHA1
f395a98bd5275456
2f1b513298e3547e
6566baed
Directory Path Hash Values Written Accesse Output of the Name Sig
d Image of the n
MD5 & SHA1 Image
Directory Path Hash Values Written Accesse Output of the file Name Sig
d of the n
MD5 & SHA1 video
Directory Path Hash Values Written Access Output of the image Name Sig
ed in the document of the n
MD5 & SHA1 Docum
ent
Directory Path Hash Values Written Accesse Output of the file Name Sig
d of the n
MD5 & SHA1 file
SHA1
25ef4820224699f6
a33e2a38d41ba0fb
2a9cf620
Directory Path Hash Values Written Accesse Output of the file Name Sig
d of the n
MD5 & SHA1 files
SHA1
2109aba9a0c807af
9591d52c9a9e15d
64e43828b
Directory Path Hash Values Written Accesse Output of the file Name Sig
d of the n
MD5 & SHA1 execut
able
file
Directory Path Hash Values Written Accesse Output of the file Name Sig
d of n
MD5 & SHA1 the
.htm
file
SHA
da6fd25750279ec3
16bf0aa4d1ead3b2
63e9771c
Investigation Process 31
After downloading the image file named Assignment2.dd from the Edith Cowan
University website, I made a copy of the original image and copied into another
folder for making the forensic copy, so that I can begin the forensic investigation
with that image without affecting the original image. I used hash function with
both original Assignment2.dd image and with the copied Assignment2.dd image
and compared their hash values with each other during the investigation which
was helping me to confirming that the image is not compromised yet and image
is still the same. As a result, integrity has been maintained in the whole forensic
investigation process.
root@sciss10oem:~# cd Desktop
root@sciss10oem:~/Desktop# cd investigation
root@sciss10oem:~/Desktop/investigation#
root@sciss10oem:~/Desktop# cd investigation
root@sciss10oem:~/Desktop/investigation# ls
Assignment2.dd lost+found
0c776f7c1ef092cdb9465fde80f4ea86 Assignment2.dd
4179cb30780358577c367a9e6e46708746ddcc53
Assignment2.dd
Open Autopsy 32
Creating NewCase
Host1 has been added in the autopsy and afterwards image i.e. Assignment2.dd
also has been added and generated its MD5 hash value to compare with the
original image MD5 has value to maintain the integrity of the image and
confirming that the image is not compromised.
Investigation Findings
A) .GIF:- When I searched for .gif files. I found certain list of files. And after
looking into each and every .gif files I found jewel.gif image.
B) .BMP:- When I searched for .bmp files. I found certain list of files. And
after analysing each and every .bmp files I found Internet Explorer
34
Wallpaper.bmp image.
C) .MP4:- When I searched for .mp4 files. I found certain list of files. And
after looking into each and every .mp4 files I found
35
60d80dd5032499bd4.mp4 video file.
D) .ZIP:- When I searched for .zip files. I found certain list of files. And after
analysing each and every .zip files I found meerkats_1024-8.jpg,
36
meerkats_1sfw.jpg, Meerkats 09.jpg, Meerkats-8.jpg, meerkats_13sfw.jpg.
E) .EXE:- When I searched for .exe files. I found certain list of files. And after
analysing each and every .exe files I found Bo2k.exe file.
37
F) .DOC:- When I searched for .doc files. I found certain list of files. And after
analysing each and every .doc files I found arrow.doc, EBook 0Z 02.doc,
38
EBook of the Prince.doc (EBook OZ 02.doc, EBook OZ 02.doc).
This above image screenshot shows one HTML document also which is about the
Meerkats. That website shows some general information about the Meerkats.
The existing HTML document looks like:
39
G) .RAR:- When I searched for .doc files. I found certain list of files. And after
analysing each and every .doc files I found Mystery.rar file.
40
Conclusion 41