Computer Forensics Hacking Investigator Case Studies
Computer Forensics Hacking Investigator Case Studies
Computer Forensics Hacking Investigator Case Studies
Case Studies
f. 13 iso files
13. The photocopier was used by all the office staff. Johnson then walked towards the Xerox
photocopier and had a glance. He noticed that it was a very advanced color photocopier powered
by embedded Linux operating system.
14. Johnson called Ms. Zelda and asked whether he could remove the hard disk of the photocopier
for investigation.
15. He placed the hard disk carefully in an anti-static bag and transported it to the forensics
laboratory.
16. He created a bit-stream image of the hard disk using tools such as R-Drive and Linux dd
commands and generated MD5 hashes of the image.
17. Johnson updated the chain-of-custody document and stored the original hard disk in a secure
location.
18. He was ready for the second round of investigation.
19. Johnson loaded the bit stream image in the Sleuth Kit and browsed every single file in the file
system.
20. He also read every single email displayed in Sleuth Kit.
21. He found that some files were located in a directory with a date on it. The files were stored as
“TIFF” image file format.
22. He viewed every image and came across an image which attracted his attention.
23. The image contained 10 pages of balance sheet and ownership transfer data of the company
Raleigh Computermart, Inc.
24. The Xerox 1703 Color Photocopier stored every single photocopy made on the machine for 7
days.
25. The TIFF document contained evidence which showed Mr. Daniel Moore had a 51 percent
ownership in the Raleigh Computermart, Inc.
26. Johnson copied those files to a CD-ROM.
27. He used Sleuth Kit reporting features and produced a professional report.
28. He delivered the report to Ms.Zelda at Computermart, Inc. along with the invoice for the
forensics service he has rendered.
29. Mr. Daniel Moore was dismissed after it was discovered, through the forensic evidence, that he
had concealed ownership interest in Raleigh Computermart, Inc.
15. Katherine’s photograph was shown to the bar tenders and the manager of the pub who
confirmed of her presence at the pub two days back just before the time of her murder. They had
seen her with a tall man with good looks in his late 30s.
16. The police scanned the credit card transactions in detail and they were able to zero down on one
particular transaction made by a person called Eric Newman. The payment was made for two 45
ml of Scotch whisky and one 45 ml of Gin.
17. The police were sure of the person involved in the crime as MSN id of the person found on
Katherine’s IBook laptop “erichulklover27” and the name of the person who visited the pub
along with Katherine matched.
18. Further investigations revealed more interesting details about the couple who visited the pub two
days back at the time of investigation.
19. Mr. Marty Smith contacted the credit card company “GreatCards” whose card was used by Eric
Newman. “GreatCards” Operations Manager Mr. Luther Rock extended his help to the police
investigating the case.
20. The personal details along with the contact address (Home/Office) were handed over to Mr.
Marty Smith by Mr. Luther Rock. The home address of Eric Newman as per the personal detail
was at Merrimac Street, Boston, MA 02114.
21. Mr. Marty Smith along with other police officials left for Boston. Mr. Marty Smith asked Wright
to join him for the investigation at Boston.
22. The police contacted the Local Court at Boston and issued a search and seizure warrant against
Eric Newman.
23. Eric Newman was taken into police custody.
24. Wright removed the hard disk from Eric Newman’s HP Presario PC.
25. He placed the hard disk carefully in anti-static bags and transported it to the forensics laboratory.
26. He created a bit-stream image of the hard disk using tools such as FTK and EnCase and
generated MD5 hashes of the bit stream images.
27. He prepared the chain of custody and stored the original hard disk in a secure location. Wright
then investigated the bit stream image copy.
28. He was ready for investigation.
29. He was asked to retrieve the following evidence:
a. Internet cache files, chat history of MSN messenger, Temporary Internet Files.
b. Outlook contacts, emails and any other evidence which would be of help in the investigation.
30. He ran MessenPass to crack the password of Eric Newman’s MSN id.
31. MessenPass cracked Eric Newman’s password. Her password is myloveeric4521.
32. Wright then logged on to Eric’s MSN messenger.
33. Wright searched Eric’s chat history. He noticed a particular MSN id “[email protected]”.
That MSN id belonged to Katherine. The chat sessions showed that Eric Newman had been
interacting with Katherine using that’s particular id for the past 6 months.
34. There were other girls listed on his MSN messenger buddy list. From his chat history Wright
concluded that Eric Newman had indeed met Katherine on the fateful day. He had plans of
meeting other girls listed on his chat list.
35. The police questioned Eric Newman. Under pressure he broke down and confessed to the crime.
The medical records of Eric Newman showed that he was a “schizophrenic”; patient of mental
disorder which was due to a depressed childhood. Katherine accompanied him to his home
where he sexually abused her and later murdered her after she threatened to report the incident to
the Local Police Department.
36. Mr. Marty Smith thanked Wright for helping the Local Police Department in solving the case.
37. Wright prepared the report of his forensics analysis in PDF format and personally delivered the
evidence CD to Mr. Marty along with an invoice for his professional service.
3. Jason created a bit-stream image of the hard disk and other storage devices using tools such as R-
Drive and Linux dd commands.
12. He prepared a professional forensics report based on the actions he has taken to restore the data.
13. He printed a copy of the report in PDF format and collected all the restored files in an
encrypted/password protected DVD-ROM.
14. Jason delivered the report to the company along with the DVD-ROM and charged his fee for the
forensics services he rendered.
16. The investigation team installed the Handy Recovery utility to check the deleted partitions from
the D: drive. It showed that 5 partitions have been deleted.
17. The team restored all the 5 partitions along with the deleted files to their local C: drive. They
observed that all recovered files were intact and in good condition.
18. The reason why they could successfully restore the data was that the deleted data was not over
written with other data.
19. The investigation team followed the same procedure to successfully recover the data in the
remaining 199 hard disks.
20. Smith called Nick and told him that his team was successful in restoring the data and how he
would like the recovered data to be delivered to him.
21. Nick told Smith to format the existing hard disks and load the recovered data on respective hard
disks.
22. The team created a forensics report and delivered it along with the 200 hard disks to Nick.
23. The team wiped the data on the rented EMC storage servers and returned the servers to the
Data Recovery Centre Inc.
24. Smith charged First Commercial Bank for his professional services as follows:
a. The team consisted of 11 investigators.
b. The team worked 8 hours a day for 4 days.
c. Smith charged $200 per hour.
d. The rental charges for EMC storage servers cost USD8000 for 4 days.
e. Transportation charges for the rented EMC rack servers, hotel charges, car rental, and airfare
for travel to New York and back cost USD 20,000.
f. Professional fees for the forensics investigation service costs USD18,000.
g. Total Cost = 8 x 200 x 10 x 4 + 8000 + 20000 + 10000 = USD 110,000.
25. Smith sent an invoice to First Commercial Bank for the service rendered.
7. He prepared a chain-of-custody document and stored the original hard disk in a secure location.
8. Martin loaded the bit stream image in FTK tool kit and browsed every single file in the file system.
9. He also read every single email displayed in FTK.
10. After many days and nights of investigation Martin retrieved the following crucial evidence:
a. Encrypted file titled Business Plan AppleMac Magazine.
b. Excel spreadsheet revenuestreams.xls.
c. Numerous email messages with Franklyn’s investors.
d. Martin used a password cracking utility to crack the encrypted file Business Plan AppleMac
Magazine.doc, the password was planapple.
11. The above documents clearly indicated that Bryan’s new business have competed with
TargetOnes’s business.
12. Martin copied these files to a DVD-ROM and used FTK’s reporting features to produce a
professional report.
13. Martin delivered the report to the company along with the invoice for the forensics services he
rendered.
14. Based on Martin’s forensic investigation report, Smith Franklyn initiated a USD 20 million lawsuit
against Bryan. After two weeks the court pronounced Smith Franklyn Bryan guilty and asked him
to pay the compensation.
11. Steve become suspicious about this file and searched Google to investigate more about the
program.
12. In his research Steve found that the BeastMan.exe program is used to permanently wipe
data from the computer so that recovery of the files is impossible.
13. At this stage of the investigation he suspected that Keith might have used this program to
destroy the Maya 3D graphic files.
14. Steve wanted to confirm the suspicion.
15. He called Mr. Julian Rod and asked him to send the backup tapes of the router, firewall,
DHCP, IDS and proxy server log files.
16. Next day, a FedEx box arrived from Mr. Rod with 4 sets of Sony backup tapes.
17. Steve created bit stream images of these tapes and examined them in FTK.
18. He searched the proxy log files called checkpointproxy.dat for search string BeastMan.exe.
19. FTK returned results as below:
10.0.0.7 64.233.189.104 10.36.12 17/08/2006
http://www.google.com/search?hl=en&hs=VSa&client=firefox-
a&rls=org.mozilla:en-
US:official_s&sa=X&oi=spell&resnum=0&ct=result&cd=1&q=how+to+perman
ently+delete+Maya+3d+file&spell=1
10.0.0.7 207.3.4.4 10:37:03 17/08/2006 GET/Trojans
wipers/BeastMan/index.htm
10.0.0.7 207.3.4.4 10:37:13 17/08/2006 GET/Trojans
wipers/BeastMan/beastman.jpeg
10.0.0.7 207.3.4.4 10:37:22 17/08/2006 GET/Trojans
wipers/BeastMan/help.txt
10.0.0.7 207.3.4.4 10:37:33 17/08/2006 GET/Trojans
wipers/BeastMan/contact.htm
10.0.0.7 207.3.4.4 10:37:40 17/08/2006 GET/Trojans
wipers/BeastMan/rule.htm
10.0.0.7 207.3.4.4 10:37:51 17/08/2006 GET/Trojans
wipers/BeastMan/beastman.exe
20. Based on these logs, Steve confirmed that the machine at 10.0.0.7 searched Google for utility that
can securely delete files from the system.
21. The machine at 10.0.0.7 visited a site located at 207.3.4.4 and downloaded a program named
beastman.exe.
22. Steve wanted to extract evidence; which machine used IP address 10.0.0.7 on 17/08/2006 at
10:37.
23. He examined the DHCP log file called dhcp.log and started searching 10.0.0.7 and 17/08/2006.
24. FTK showed him one result. The text is as follows:
Lease duration; 180mins, DHCP scope:0, IP 100.0.7, subnet mask 255.255.255.0, MAC 00-
11-11-A0-5A-47
25. It was confirmed that the computer at Sancong with the MAC address of 00-11-11-A0-5A-47 was
used to download the BeastMan program.
26. Further investigation confirmed that the MAC address belongs to Keith’s computer.
27. Steve was further required to prove that Keith was at his desk at that particular time, and was the
one who downloaded the program.
28. Steve called Mr. Rod and enquired about physical security policies and authentication system the
company used.
29. Mr. Julian replied that every employee in his company has a company ID card and must use this
card to access every department section. He also said that there are CCTV cameras present at the
ceiling of every department in the company and the images are recorded to DVD drives 24x7.
30. Steve asked Mr. Rod to send the log files of physical access card data and copies of CCTV DVD
recordings.
31. The next day, he received a FedEx box with the above items from Mr. Julian.
32. New access control log files were created every day of the week. Steve searched the access control
log file named acccntrl170806 and discovered an entry as:
Acc3742 EMP2316 Keith Robertson 17 08 06 10:24:34 Auth type:
33. The above log confirmed that Keith Robertson used his card to gain access to Room 37. This also
confirmed that he was present at his desk while BeastMan.exe was being downloaded.
34. To further confirm his findings, Steve scanned through few DVDs and located the DVD file
CCTVrecording170806.mpeg.
35. He played the .mpeg file in Windows Media Player and positioned the frame to time 10:36:00.
36. He saw Keith Roberson sitting in front of his computer seriously looking at his computer screen
while talking to someone on the phone.
37. This proved that Keith was indeed the one who downloaded the file and destroyed the data.
38. Steve has gathered the necessary evidence of Keith’s hand in the sabotage, but the files could not
be recovered as the hard disk was wiped out using BeastMan.exe.
39. Steve used FTK’s reporting feature and produced a professional report which included the
evidence from DHCP logs, Access control logs and CCTV disc.
40. He delivered the report to Mr. Rod and issued an invoice to Sancong Mobile Manufacturing
Company for the payment towards his service.
Based on Steve’s evidence, Mr. Rod filed a lawsuit against Keith Robertson for sabotage and
destruction of confidential data. Mr. Rod claimed USD 6.7 million as damages.
12. He used Encase Hex Editing utility to fix the partition table.
13. He saved the hard disk image and mounted it as a primary device in another computer.
14. The computer booted normally and he copied all the IRS Tax files, spreadsheet documents to a
DVD-ROM.
15. Brian prepared a professional forensics report based on the actions he has taken to restore the
data.
16. He printed a copy of the report in PDF format and attached the restored files in an
encrypted/password protected DVD-ROM.
17. Brian delivered the report to the company along with the fee for the forensics service he rendered.
15. He scanned through the exchange server log files and found that Joan has been sending a mail
with no messages to [email protected].
16. He saw that there were about 10 emails sent to this address with no message but with an
attachment of blank text file with no data in it.
17. He wondered “why did she send so many emails with empty blank files?” The size of the blank
files was 500kb.
18. He suspected that the blank files contained steganography code.
19. Mathew scanned the blank files with the snow steganography utility and was amazed to see the
confidential customer loan profiles of 6000 banks’.
20. This evidence showed that Joan used steganography to conceal the data and send them to a third
party outside the company.
21. Mathew prepared the report in PDF format and delivered the evidence CD back to Don along
with an invoice for his professional service.
22. Don initiated a lawsuit against Joan Shelly for theft of confidential information.
13. Dr. Rogers hired an attorney to fight his case. Based on Richard’s forensics analysis and the
attorney’s legal explanations, the District Court Judge dismissed the racial discrimination case
against Dr. Rogers.
14. Dr. Rogers lost many clients due to the bad publicity in the press.
15. Dr. Rogers filed for a defamation case against Jackson for a sum of USD 500,000.
12. Fabian stored the iPod in a static free bag and marked it as evidence.
13. He created a bit-stream image of the iPod using tools such as FTK and EnCase.
14. He generated MD5 hashes of the bit stream image.
15. Fabian prepared a chain-of-custody document and stored the original iPod in a secure location.
16. EnCase recovered all files present in the iPod including the deleted ones.
17. He noticed an image file called blueprintimp.jpeg. The size of the image file was 800kb.
18. He opened the image file. The image turned out to be Ron’s Photograph.
19. Fabian tried to open the file blueprintimp.jpeg using StegDetect, a steganalysis tool.
20. He found information related to the product embedded into the image file.
21. He prepared the report of his forensics analysis in PDF format and delivered it to John along with
an invoice for his professional service.
Based on his investigation and evidence found, Ron was arrested by the Local Police Department.
Ron confessed to the crime. John sued SecureOffline Storage Inc. on corporate espionage charges for
a sum of USD15 million.
b. Pornographic videos
7. He loaded the bit stream image in FTK tool kit and searched for image files (jpeg, gif, bmp, tiff)
and videos (mpeg, dat, avi, mov) in the hard disk image.
8. FTK search came up with pornographic images and video files in the following directories:
a. C:\Documents and Settings\Conference\My Documents\My Pictures
9. Most of the pornographic images and video content was related to “Lesbian Sex activities”.
10. Jayson copied those files to a DVD-ROM.
11. He used FTK report features and produced a professional report.
12. He delivered the report to Mr. Mark Dwendler and issued an invoice to Cosmopolitan-Ad
Agency for the payment towards his service.
Based on Jayson’s report Natasha Gabriel was fired from the company for breaching the clause 3.1 (a)
mentioned in the Employment Agreement.
[Jonathan]: Yes, I investigated this email header and I confirm the following:
The email was sent from Sheela Rally to Rouba Bandoras.
The IP address of the email server was correct and it was routed through 207.3.3.3 which confirms
her domain xjewellery.com
I have computed the Message ID of the SMTP server and it is accurate.
[Mr. Bond Level]: In other words this email message cannot be forged, right? [Jonathan]: Yes
[Mr. Bond Level]: Could you tell the court, if there is any possibility for the message to be bogus
[Jonathan]: No. The message server logs also show that the message id and the date sent matches with
Microsoft Outlook’s data from Mrs. Sheela Rally’s computer.
[Mr. Bond Level]: Are you sure? Very sure? This message is authentic and cannot be forged?
[Jonathan]: Yes
[Mr. Bond Level]: That’s all Your Honor.
[Judge]: Mr. Green Smith, would you like to cross examine the Expert Witness? [Green Smith]: Yes Your
Honor.
Jonathan walked up to the witness stand.
[Green Smith]: Mr. Jonathan Shelly, could you tell me exactly what technical skills do you possess?
[Jonathan]: I’m sorry I do not understand the question
[Green Smith]: Let me rephrase the question. What Internet server technologies and client technologies
have you mastered till today?
[Jonathan]: I have worked with UNIX, Linux, Mainframe computers, Internet Programming Languages,
Microsoft Windows 2000, XP, 2003, Firewalls, IDS, Proxy servers, Routers etc. I have 20 years of
experience in the IT field.
[Green Smith]: You have stated that you have conducted a forensics analysis on Mrs. Sheela Rally’s
computer and found the IP address to be the same on the server log files. Am I right?
[Jonathan]: The evidence file analysis was conducted using Encase, which was linked to …. Green Smith
interrupts Jonathan!
[Green Smith]: Please answer yes or no. Judge intervenes.
[Judge]: Mr. Jonathan Shelly please answer the question.
[Jonathan]: (Looking at the judge) Yes Your Honor
[Jonathan]: Yes
[Green Smith]: Could you explain to the court what unique message id was created by the SMTP server?
[Jonathan]: The message id was calculated by the SMTP server program using MD5 algorithm [Green
Smith]: What is MD5 algorithm Mr. Jonathan Shelly?
[Jonathan]: MD5 is a secure hashing function that converts an arbitrarily long data stream into a digest of
fixed size. It is conjectured that the difficulty of coming up with two messages having the same message
digest is on the order of 2 64 operations, and that the difficulty of coming up with any message having a
given message digest is on the order of 2 128 operations
[Green Smith]: Thank you Mr. Jonathan Shelly. So this message cannot be duplicated using another
identical message id. Am I right?
[Jonathan]: Yes
[Green Smith]: Based on your experience, your professional qualifications, your technical competency, is
the email message authentic and cannot be forged?
[Jonathan]: Yes
[Green Smith]: Please take a look at Exhibit A and note the SMPTP server CommuniGate Pro 6.1.2. Can
you tell me what that is?
[Jonathan]: CommuniGate Pro is a SMTP server program for Linux Operating System and is widely used
on embedded computers
[Green Smith]: The email header shows that the message was routed through CommuniGate Pro 6.1.2
server. Am I right?
[Jonathan]: Yes
[Green Smith]: Once again based on your thorough investigation on the SMTP log files and Sheela Rally’s
computer hard disk image the message was routed through CommuniGate Pro 6.1.2 server, Yes or No?
[Jonathan]: Yes. 100% right!
[Green Smith]: Mr. Jonathan Shelly, I searched in Google for the term “CommuniGate Pro 6.1.2” but
could not find any results. I contacted several Linux professionals and asked them if there was ever
CommuniGate Pro 6.1.2 and their answer was No. The latest version was 4.1.2. I contacted the company
vendor Stalker Corporation and asked them if they ever produced CommuniGate Pro 6.1.2 server and
their reply was No. Also they mentioned that the banner message of SMTP server cannot be altered.
(Jonathan handed over Exhibit C to the Judge an email text message sent from Stalker communication to
Green Smith)
[Green Smith]: Mr. Jonathan Shelly, please take a look at Exhibit A and tell me if this email header is
accurate and not forged
[Jonathan]: (pause…….pause……pause...) mmm…I’m not sure (Jonathan looked at the Judge)
[Green Smith]: This email message cannot be accepted as evidence. Thank you Your Honor.
(The Judge dismissed the email message as crucial evidence in the divorce case)
Note: It is necessary to conduct a thorough forensics investigation and justify the report 100% in the
Court of Law. Jonathan just lost the case.