IT602 - Lab - Manual Final
IT602 - Lab - Manual Final
Lab Manual
LIST OF EXPERIMENTS:
1. Recovery & analyses of Data Using the EaseUS Data Recovery tool
2. Performing Hash, Checksum, or HMAC Calculations Using the HashCaIc:
3. Viewing Files of Various Formats Using the File Viewer
4. Handling Evidence Data Using the P2 Commander.
5. Creating A Disk Image File of a Hard Disk Partition Using the R-Drive Image.
6. Analyzing file system types using the Sleuth Kit (TSK)
7. Analyzing raw image using Autopsy.
8. Investigating NTFS drive using Disk Explorer for NTFS.
9. Viewing Content of Forensic Image Using Access Data FTK Imager Tool
10. Discovering and extracting hidden forensic material on computers
11. Viewing, Monitoring, and Analyzing Events using the Event log Explorer.
12. Performing a computer forensic investigation using the Helix tool
13. Acquiring volatile data in Linux system.
14. Analyzing Non-Volatile data in Linux system.
15. Scanning System and Network Resources Using Advanced IP Scanner
16. Monitoring TCP/IP Connections Using the CurrPorts Tool
17. Exploring and Auditing a Network Using Nmap
Lab Objectives:
The objective of this lab is to help students understand and perform data recovery
using the EaseUS Data Recovery
Wizard tool.
Lab Environment:
This Lab requires:
Lab Tasks:
1. Log on to Windows 10 Virtual machine.
2. Navigate to Z:\CHFIv9Module 02 Computer Forensics Investigation Process\Data
Recovery Tools\EaseUS Data Recovery Wizard, double-click drw_free.exe, select a
language (English) and follow the Wizard driven installation steps to install the
application.
7. The application begins to scan the drive and begins to display the contents of the
drive, along With the data that has been deleted.
8. On completion of the scan, a pop-up appears; click OK to close the pop-up.
5|P age Digital Forensics Technology & Practices Lab Manual
9. The file system of D drive appears in the left pane, displaying the files present in
the drive ( if any), along With the deleted files (denoted by the letter d) as shown in
the following screenshot:
10. To View the deleted files insidea folder Which contains sub-folders, you need to
expand the nodes pertaining to each directory, until you find a directory that contains
files.
11. In this lab, the deleted contents of the directory top_files located in\AI-Qaida
Hard Disk\AI-Qaida
Articles\x_files\ are viewed.
12. To View the deleted file, right-click on the respectivefile and click Preview.
15. To view the files pertaining to image format, click Graphics tab and then, select
a folder. The images present in the folder appear in the right-pane as shown in the
following screenshot:
17. A Browse for Folder Window appears. You need to choose a location to store the
recovered files.
18. So, navigate to Documents, create a folder named Recovered Files and then click
OK.
20. Open the New Volume folder. The New Volumefolder contains folder Image Files
folder, from Where we have recovered the deleted files as indicated in step no. 16.open
this folder.
21. The files are successfully recovered as shown in the following screenshot:
23. This way, you may also View files of other formats and recover them. In some cases,
the application may fail to find all the deleted files. In such cases, you may need to
perform a deep scan on the respective disk
Lab A nalysis:
…………………………………………………………………………………………………………
…………………………………………………………………………………………………………
…………………………………………………………………………………………………………
……………………………………
…………………………………………………………………………………………………………
……………………………………
…………………………………………………………………………………………………………
……………………………………
Lab Objectives:
This lab will show you how to encrypt data and how to use it. Furthermore, it will
teach you how to:
4. In the final step of installation, uncheck View the README file option. check
Launch HashCaIc option and click
Finish
6. In the Data Format drop-down list, select file format as File and clickthe ellipsis
button associated With the Data field to select the file.
Note:To calculate the message digests /checksums for the data, the HMAC box must
be unchecked.
9. Select the algorithms you want to use for calculations by checking the boxes
With the appropriate names, and then click the Calculate button.
12. HashCalc calculates the hashes of the specified fileand displays them as shown
in the following screenshot:
14. If you want to perform a calculation for a text string, first select Text string from
the Data Format drop-down list and then enter the text in the Data field.
15. Select the algorithm you want to use for calculations by checking the required
algorithms and then clickthe
Calculate button.
Lab A nalysis:
…………………………………………………………………………………………………………
……………………………………
…………………………………………………………………………………………………………
……………………………………
…………………………………………………………………………………………………………
……………………………………
…………………………………………………………………………………………………………
……………………………………
…………………………………………………………………………………………………………
……………………………………
Lab Environment:
This lab requires:
Kindly note that, if you decide to download the latest version, then screenshots
shown in the lab might differ.
Lab Tasks:
1. Navigate to C:\CHFI-Tools\CHFlv9Module 02 Computer Forensics
Investigation Process\Hash Value Calculator
Tools\MDS Calculator.
2. Double-click md5calc(1.0.0.0).msi to launch the setup‘ and then follow the
Wizard-driven installation steps to install the application.
Lab A nalysis:
……………………………………………………………………………………………………
…………………………………………
……………………………………………………………………………………………………
…………………………………………
Lab Objectives:
The objective of this lab is to help students learn and perform fileviewing with
the help of File Viewer. Fileviewer is used for:
Lab Environment:
This lab requires:
Lab Tasks:
1. Navigate to C:\CHFI-Tools\Evidence Files\lmage Files to View the evidence
files. You Will be selecting a file from this location in the subsequent steps.
13. You may save the image for further reference, and you have an option to
save the image in a different file format. However, this feature is availableonly
for the licensed version of File Viewer.
Lab A nalysis:
Lab Objectives:
The objective of this lab is to help students learn and use P2 commander for
handling evidence data.
Lab Environment:
This lab requires:
Please note that, if you decide to download the latest version, then the
screenshots shown in this lab might differ slightly
A computer running Windows Server 2012 virtual machine.
Administrative privileges to install and run tools.
Lab Tasks:
1. Navigate to C:\CHFI-Tools\CHFIv9Module 02Computer Forensics
Investigation Process\Computer Forensics
Software\P2Commander.
2. Double-click p2c-demo.exe to launch the setup, and follow the Wizard-
driven installation steps to install the application.
Note:If an Open File - Security Warning pop-up appears, click Run.
Apps screen.
6. An Activation pop-up subsequently appears, click Later.
Note:The P2 Commander Trial version can be used for only 30 days with a
limited number (7) of executions.
13. In the Add New Evidence Window, select Image File under the
Category section in the left pane then select
Auto-detect image under the Source type section and click OK.
17. Data Analyzing Options section appears, select the required options
and click Next.
18. Advanced Options section appears; select the options required for
analyzing the image and click Next.
20. The selected image file is added to the case (Test 1file under
the Case Content).
23. To add a file to the report, right-click on the file and then click Add to
report/File Export.
25. If you want to see the actual image of the selected file, clickthe File View
tab.
27. To View the text values of the selected file, clickthe Text View
tab.
32. In the file system section, select the required options and clicknext.
34. In the sorted files section, select the include onlydata checked as
“include to reports” radio button and then
clicknext.
36. Navigate to the folder Where you have saved the Report. In this
folder, you Will find a sub folder named Test
1.ope11 that folder and double-click the Test 1.html file to view the
report.
Lab A nalysis:
…………………………………………………………………………………………………
…………………………………………
…………………………………………………………………………………………………
……………………………………………
…………………………………………………………………………………………………
……………………………………………
42 | P a g e Digital Forensics Technology & Practices Lab Manual
Lab 5: Creating a Disk Image File of a Hard Disk Partition Using the R-
Drive Image:
Lab Objectives:
The objective of this lab is to help students understand how to create a disk image file
of hard disk partition using R - drive image.
Lab Environment:
This lab requires:
Please note that, if you decide to download the latest version, then the screenshots
shown in this lab might differ slightly.
A computer running Windows 10Virtual machine.
Administrative privileges to install and run tools.
Lab Tasks:
1. Navigate to Z:\CHFIv9Module 02 Computer Forensics Investigation
Process\Computer Forensics Software\R- drive Image.
2. Double-click RDrivelmage6.exe to launch the setup, select the language (here,
English) and follow the Wizard-
driven installation steps to install the application.
Note:If an Open File - Security Warning pop-up appears, click Run.
10. The Processing Window Will show the summary of allthe processes Click Start to
start the disk partition imaging process.
12. Once the processing is done, the following pop-up Window is displayed.
Click OK
14. In the R-Drive Image Window, clickthe Exit button to close the
application.
15. Go to the D Drive to View the created disk partition image file.
……………………………………………………………………………………………………………
…………………………………
……………………………………………………………………………………………………………
…………………………………
……………………………………………………………………………………………………………
…………………………………
……………………………………………………………………………………………………………
…………………………………
……………………………………………………………………………………………………………
…………………………………
Lab Environment:
This lab requires:
Lab Tasks:
1. Navigate to C:\CHFI-Tools\Evidence Files\Raw - DD Image for the evidence files.
Lab A nalysis:
……………………………………………………………………………………………………………
…………………………………
……………………………………………………………………………………………………………
…………………………………
Lab Objectives:
The objective of this lab is to help investigators learn and perform file system analysis.
The Sleuth Kit (TSK) is used to obtain:
Lab Environment:
This lab requires:
Lab Tasks:
1. Navigate to C:\CHFI-Tools\CHFlv9Module 03 Understanding Hard Disks and File
Systems\File System Analysis
Tools\The Sleuth Kit (TSK).
2.Select bin folder, press Shift +Right clickon the keyboard and select Open command
window herefrom the context menuto open command prompt Window.
4.Use the istat tool of the sleuth kit to view the details of metadata structure.
5.To view the MFTFile Overview, tvpe istat -f ntfs "C:\CHFI- Tools\Evidence Files\Disk
Partition Raw
Image\DiskPartitionRawlmage.dd" 0
Note: MFTentry 1is for the MFTMirr file, which has a non-resident attributethat
contains a backup copy of the first
MFT entries.
7.To view the Boot File overview, type istat -f ntfs "C:\CHFI-Tools\Evidence Files\Disk
Partition Raw
Image\DiskPartitionRawImage.dd" 7
8.To view the File Volume overview, type istat -f ntfs "C:\CHFI-Tools\Evidence Files\Disk
Partition Raw
Image\DiskPartitionRawlmage.dd"
Note:The Volume filesystem metadata file is located in MFTentry 3 and contains the
volume label and other version information.
9.To view AttrDef File Overview, type istat -f ntfs "C:\CHFI-Tools\Evidence Files\Disk
Partition Raw
Note:The MFT entry for AttirDef filesystem metadata fileis 4.It defines the names and
type identifiers for each type of attribute.
10. To Vi€\V Bitmap File overview, type istat -f ntfs “C:\CHFI-Tools\Evidence Files\Disk
Partition Raw
Image\DiskPartitionRawlmage.dd" 6
Note:NTFS keeps track of the damaged clusters by allocating them to a SDATA attribute
of the Bad Clus tile system metadata tile. The MFTentry is 8
12. To View the Secure File OyeiyieW, type istat -f ntfs "C:\CHFI-Tools\Evidence
Files\Disk Partition Raw
Image\DiskPartitionRawImage.dd" 9
14. To see only the deleted entries, type fls -d "C:\CHFI-Tools\Evidence Files\Disk
Partition Raw
Image\DiskPartitionRawlmage.dd“
15. Use the img_stat command to see the details of an image. Type img_stat "C:\CHFI-
Tools\Evidence Files\Disk
Partition Raw Image\DiskPartitionRawlmage.dd" and press Enter to see the details of an
image file.
……………………………………………………………………………………………………………
…………………………………
……………………………………………………………………………………………………………
…………………………………
……………………………………………………………………………………………………………
…………………………………
……………………………………………………………………………………………………………
…………………………………
……………………………………………………………………………………………………………
…………………………………
Lab Objectives:
The objective of this lab is to help investigators learn and perform file system
analysis using Autopsy:
Lab Environment:
This lab requires:
Lab Tasks:
1. To launch Autopsy, navigate to Applications ->11- Forensics -> autopsy.
3.In the terminal Window it will instruct to open a browser and browse the URL
http://localhost:9999/autopsy , copy the given URL as shown in the screenshot.
Note:Do not close the terminal Window until the process is completed.
4.Once the link is copied, now click Iceweasel icon from the task bar to open a web
browser.
5.Paste the copied link in the Iceweasel browser’s address bar and press Enter.
8.In this lab we have given this case a numerical case name as 100, and description as
Test, and Investigator name as Johnathan, and click NewCase.
11. ADDA NEWHOST webpage next appears Where you need to fill the details,
and click ADDHOST button.
12. After successfully adding host to autopsy, it will appear as shown in the screenshot
13. Now, we need to add an image for investigation. Click ADDIMAGE button.
15. ADD A NEW IMAGEpage appears; here we need to provide the location of the
image in the Location field, Type of the Image, and Import Method.
default, and click NEXT. Note: While you are dragging the image file, the path
19. Image File Details webpage next appears, leave the settings to default and
click ADD.
21. Once the image is added to Autopsy database, you can analyze the image.
To analyze the image click ANALYZE.
22. To start analyzing the added disk image, you can choose the analysis
mode from the above tabs as shown in the screenshot.
Thus, you can go through the allthe required options of the Autopsy in
detail required for your investigat ion.
Lab A nalysis:
Analysis and document the results related to this experiment.
………………………………………………………………………………………………
………………………………………………
Lab Objectives:
The objective of this lab is to help students learn how to investigate the NTFS
Lab Environment:
To carry out the lab. you need:
DiskExplorer for NTFS, located at C:\CHFl-Tools\CHFIv9Module 04
Data Acquisition and Duplication\Data Acquisition Tools\DiskExplrorer for
NTFS.
You can also download the latest version of DiskExprorer for
NTFS from the link https://www.runtime.org/diskexplorer.htm
Kindly note that if you decide to download the latest version, screenshots
shown in the lab might differ.
Lab Tasks:
1. Navigate to C:\CHFI-Tools\CHFIv9Module 04 Data Acquisition and
Duplication\Data Acquisition Tools\DiskExplorer for NTFS.
2.Double-click setup.exeto launch the Setup, and follow the wizard- driven
installation steps.
Note:If an Open File - Security Warning pop-up appears, click Run
3.To launch DiskExplorer for NTFS, double-click the shortcut icon
7.In the File of type drop-down list, select Allfiles (*.*),and then click Open.
8.It will display the complete details of the image file in two sectors, Valid and Invalid
Boot Sector, as shown in the figure below:
10. In the Gotosector… wizard, enter the hex value in the sector or Byte section to jump
to a new position, and then click OK.
12. Now click View as Hex, or alternatively you can press F3 to view the hex
values of the selected sector.
16. Navigate to Edit and click Copy to file to copy the evidence files for
further processing.
18. In the confirm pop-up window, click Yes to split an image file into several files,
as the destination drive might not accept very large files.
………………………………………………………………………………………………………
………………………………………
………………………………………………………………………………………………………
………………………………………
Lab Objectives:
Allthe system related data remains saved in the system hard disk. When an incident
occurs, there is a probability that the system is shutdown and switching it on
would make changes in the evidence present on it. Even if the system is on,the
investigators should not use forensics techniques on it directly, as it may tamper the
evidence and render it useless during the trial. Therefore, an investigator should
always create a duplicate of the storage and this lab will help you to create an image
of the file you need to investigate.
The objective of this lab is to help students learn how to use Access Data FTK Imager
for creating forensics images.
Lab Environment:
To carry out the lab, you need:
Lab Tasks:
1. Navigate to C:\ CHFI-Tools\CHFIv9Module 0 4 Data Acquisition and
Duplication \Data Acquisition Tools
\AccessData FTK Imager.
5.Select the Image File option from the Select Source wizard and then click Next.
9.To view the Hex value of the particular file, select the file from the File List and
clickthe Hex icon on the toolbar.
81 | P a g e Digital Forensics Technology & Practices Lab Manual
10. Hex values of the selected file will be displayed in the bottom-right pane.
11. Click the properties tab in the lower-left pane to view the properties such as
file class, size,date, start cluster, etc. of the selected file.
12. Click the Hex Value Interpreter tab in the lower-left pane to view the properties
such as signed integer, DOS date, etc. of the selected file.
………………………………………………………………………………………………………
………………………………………
………………………………………………………………………………………………………
………………………………………
Lab objectives:
The objective of this lab is to help students learn how to investigate a suspect’s
computer to locate evidence of a
crime, in this lab, you will learn how to use the OSForensics tool.
Lab environment:
Lab tasks
1- Navigate to C:\CHFI-Tools\CHFIV( module 06 operating system forensics\window
forensics tools\OSForensics.
2- Double-click osf.exeto launch the setup and follow the wizard-driven installation
instructions. Note:if an open file – security warning pop-up appears, clickrun.
3- In the final step of installation, check launch OSForensics option and click finish.
4- 4. OSForensics GUI appears, along with passMark OSForensics
6- Complete the required fields of the new case wizard, and choose to save
the new case folder in either the default or custom location and click ok
Note:if you want to create a new case in a custom location, clickthe browse
button, indicate the desired path, and then clickok. In this lab, the case name is
case 1and the default case folder has been selected.
9- To search for files, type a file name or extension in the search string of the
file name search window, or you can also select the file type from the presets drop-
down list.
10- In this lab, image has been selected from the presets drop-down list.
11- In the start folder field, indicate the path to search by clicking the browse
button, and then clickthe search button.
13- This displays allthe images present in the specified location. You may
analyze these files, to see if any suspicious or unwanted image\ images are
stored in the location.
Step1: select the use pre-defined filetypes option for creating the index and
check the requi red options listed below (here, images options has been
selected) for selecting the file types, then click next.
Select the specific folder radio button, and clickthe ellipsis button to add
folders. For this lab, select the C:\CHFI- Tools\Evidence file\image files folders
and clickthe ok button.
Step 3: specify an index title( case 1) and index notes (optional), then
clickstart indexing.
Note :if a maximum page limit in free version dialog box appears while
scanning, clickok to close it.
Step 5 :display the status of the indexing. Once the indexing is completed, an
OSForensics – created index pop- up appears, clickok.
21- To recover the deleted files from the file stem, clickdeleted files search in
the left pane, select a disk on which you want to perform the deleted
filesearch ( here, Partition 1,C:), and clickthe search button.
23- To locate files whose contents do not match with the file extentions, click
mismatch filesearch in the left pane of the window.
24- Click the browse button to give the location path to search. In this lab,
navigate to C:\CHFI-Tools\Evidence
Files\Image Files and clickthe search button.
26- To view the processes that are running on the system, click Memory
Viewer in the left pane of the window.
27- An OSForensics – Warning pop-up appears, clickok.
29- To analyze the raw sectors of all physical disks and partitions, click Raw Disk
Viewer, and select a disk ( here,C: Drive) to view its raw contents.
34- It displays the commands executed, with complete details in the Result tab
as shown in the following screenshot:
37- Click the Ellipsisbutton to specify a file or Volume or Text to calculate the
hash value. (In this lab, navigate to the file C:\CHFI_Tools \Evidence
Files\Image.txt to calculate the hash value of Images.txt)
38- 38- Select Hash Function (here, MD5) from the drop-down menu and then
click Calculate.
99 | P a g e Digital Forensics Technology & Practices Lab Manual
39- The calculated hash value appears in the Calculated Has field as shown in
the following screenshot:
40- To identify known safe files or known suspected files, click Hash Sets to
reduce the need for further time - consuming analysis.
41- To create a new database click New Db,enter the new database name in
the database Name field, and clickok.
100 | P a g e Digital Forensics Technology & Practices Lab Manual
42- Right clickon the Investigation database and select Make Active option
from the context menu
49- Mention the path to store the Target Image File by clicking the Browse button.
Complete the respectivefields, check the Verity Image file After Completion option, and
clickthe Create Image button.
Note:it will take time to create drive image.
It is suggested to abort the imaging process as it require huge amount of free space.
56- A forensic copy has been created in the following path, with the results in the bottom
pane of the window.
……………………………………………………………………………………………………………
…………………………………
……………………………………………………………………………………………………………
…………………………………
……………………………………………………………………………………………………………
…………………………………
……………………………………………………………………………………………………………
…………………………………
……………………………………………………………………………………………………………
…………………………………
Lab Objectives
The objective of this lab is to help forensicinvestigators learn how to view, monitor, and
analyze various events. Here we, monitor and analyze:
Securitylogs
Systemlogs
Applicationlogs
Other logs of theMicrosoft Windows OS.
Lab Environment
This lab requires:
Event Log Explorer located atC:\CHFl-Tools\CHFlv9 module 06 operating System
Forensics\WindowsForensics
Tools\Event Log Explorer.
You can alsodownload the latest version of Event Log Explorer from
www.eventlogxp.com.
If you decide to download the latest version, then the screenshots shown in the lab
might be slightly different.
A computer running Windows Server 2012.
Administrative privileges to install and run tools.
Lab Tasks
1- Navigate to C:\CHFl-Tools\CHFlv9 module 06 operating System Forensics\Windows
Forensics Tools\Event Log
Explorer.
2- Double-click elex-setup.exeto launch the setup, select the language as English, and follow
the wizard-driven installation steps to install the application.
Note:If an open File – Security Warning pop-up appears, click Run.
3- In the final step of installation, check Launch Event Log Explorerand click Finish.
6- Event Log Explorermain windowappears, displaying an empty log view area and
Computer Tree pane with WindowsServer 2012 virtual machine’scomputer name.
7- If the local computername does not appear in the computer Tree pane, then choose
File→ New Workspace.
9- It will expand the computer node to display allavailable event logs as shown in the
following screenshot:
11- Event Log Explorer also displays the events of Applicure DFS Replication,
dotDefenderAudit, Hardware Events, Key Management service, OAlerts, Security, System,
Windows PowerShell.
12- Selecting an event displays the description of the event in the Descriptionpane at
the lower end of the Window.
13- You can also filter the events. To filter the events, clickthe filter icon
14- It will pop up a new Filter window. Choose Source, Category, User and
Computer and then, click Ok.
15- Event Log Explorer displays allthe events related to your Filter Settings.
16- To clear the FilterSettings,click on the clear Filter button on the toolbar,
or go to view→Clear Filter.
19- Navigate to the location where you saved the event logs and double -click on
file to see the saved event logs.
20- The saved logs appear in the Event Viewer window as shown in the following
screenshot:
21- An alternative method for opening an event log file is to choose File→ Open
LogFile→Standard (or)File→
Open Log File→ Direct.
22- In the pop-up window, click Browse to select the file and then click Ok.
It will open the saved file.
24- A Clear Logpop-up appears;clickYes if you want to save the logs. If you do not want
to save logs, clickNo. It will clear all the event logs of the selected category in the
Computer Tree pane on the left.
Lab A nalysis:
……………………………………………………………………………………………………………
…………………………………
……………………………………………………………………………………………………………
…………………………………
……………………………………………………………………………………………………………
…………………………………
……………………………………………………………………………………………………………
…………………………………
……………………………………………………………………………………………………………
…………………………………
Lab Tasks
After clicking the Accept button, Helix GUI appears as shown in the following screenshot:
7-
Click the (…….)
button to go the second System Informationpage.
This page displays the processes running on your system.
10-
13- Choose Contents of a Folder as the source evidence type, and then click Next to
create an image.
18- Now clickthe Browsebutton to give a destination path (in this lab we have created a
folder named Helix Result in
c:\and saved the result in C:\Helix Result), enter an Image Filenameexcluding the
extension, and click Finish.
20- After completion, the Drive\Image Verify Results summary will pop up,click Close and
then click Close in the create Imagewizard.
21- Access Data FTK Imager created an image of a folder, to check this, navigate to
the C:\Helix Result path mentioned in the destination.
28- Now close the Access Data FTK Imager by clicking Exit in the File menu.
3
Nigilant32 pop-up appears, clickthe pop-up. 2
-
32- Choose File → Preview Disk… to view the Preview of the hard drives.
33- Select the drive to Preview, and then click the Apply button. Note: Do not
select the C Drive (contains system file).
37- It will display the Live Machine Snapshot window. If you want to save the
snapshot, clickthe Save button.
41- The Save As window appears, select the location in which the snapshot has to be
saved and mention the file name in the File Name field, and click Save.
46- Now clickthe File Recovery icon to recover the deleted files.
47- It will prompt you with the Notice window. Click Yesto run
Filerecovery.exe.
49- Click the (…..)button in the Welcome window of the PC Inspector File
Recovery wizard.
51- Now select a drive from the Logical drive or Physical drivetabs. In this lab, we are
recovering files for logical drives.
52- Select any drive from the Logical drivetab and clickthe (….)button.
54- In the left pane of the window, it will display a tree structure. In that structure, you
can find a Deleted file string.
55- Expand theDeleted node;select a folder from the left pane. The contents of the
folder appears in the right pane.
56- You can save those files to another hard drive or disk by right-clicking on the
respective file and clickingSave to, and then, specifying the location to store the file.
141 | P a g e Digital Forensics Technology & Practices Lab Manual
57- Now clickthe (…..)button to navigate to Page 3.
58- To know the contents of your drives, clickthe Browse icon in the left pane. It
displays allthe drives in the middle pane of the window.
59- Expand the drive of your choice and expand the folders within the drive. It displays
the files within the selected
folder in the right pane.
60- Now, select a file in the right pane. The application displaythefileproperties in the
lower right pane of the window as shown in the screenshot:
64- You can view the images scanned by Helix as shown in the screenshot:
Lab A nalysis:
Lab Objectives:
The objective of this lab is to help students learn to gather volatiledata from a live
Linux system and analyze it to find traces of attack to define the type, impact points,
path as well as the perpetrator.
Lab Environment:
To carry the lab, you need:
Lab Tasks:
1- Launch a Terminal in the system
Note:Create a copy or image of the hard disk before acquiring any volatile data, as the
commands and actions used to analyze it can make changes to the file in the system.
5- The Ishw command will help you in printing the hardware details of the system.
Use -short option to print the summary of the information.
7- To gather the details of last login sessions, issue the command last -a .
9- You can review the current network settings using the command ifconfig -
a.
Note:If Ubuntu is unable to download auditd, you need to update the repositories
using the commands apt-get update and apt-get upgrade .
13- The auditing tool consists of utilities the would help in creating records about the
system information.
14- Gather details of allthe login attempts made to the system by issuing the command
aureport .
16- Linux stores the scheduled tasks in /var/spool/cron/ and /etc/cron.daily the
system files. Find the scheduled tasks by verifying these files.
17- The cron files also store data about the tasks scheduled hourly, daily, weekly and
monthly. To view the daily scheduled task files go to /etc/cron.daily.
20- Use the ps command to view the running processes in the system. You can use
the option auxww to view alldetails of the running processes.
Note:If any error related to grep appears, you need to install grep on the machine.
Issue the command, apt-get install grep to install grep on Ubuntu.
22- You can collect the current state data of the system by viewing the state of
processes running in the / proc file system.
23- Clipboard stores the details of files or text copied recently. Copy and review the
clipboard contents using the xclip command.
Lab A nalysis:
……………………………………………………………………………………………………
…………………………………………
……………………………………………………………………………………………………
…………………………………………
……………………………………………………………………………………………………
…………………………………………
……………………………………………………………………………………………………
…………………………………………
Lab Objectives:
The objective of this lab is to help students learn how to analyze an image of a
Linux hard disk and gather required evidence from it.
Lab Environment:
To carry out the lab, you need:
Autopsy located at C:\CHFI-Tools\CHFIv9 Module 06 Operating System
Forensics\Linux Forensics
Tools\Autopsy
A computer running Windows server 2012
Administrative privileges to run tools
A web browser with an Internet connection
Lab Tasks:
1- Before beginning this lab, navigate to C:\CHFI-Tools\Evidence Files\Linux
Image, right-click on Linux_disk1.7z
and select Extract Here. On extracting the file, delete Linux_disk1.7z.
2- Navigate to C:\CHFI-Tools\CHFIv9Module 06Operating System
Forensics\Linux Forensics Tools\Autopsy.
3- Double-click autopsy-4.0.0.6-64bit.msc to launch the setup, and follow the
wizard-driven installation instructions to install the application.
4- Double-click Autopsy 4.0.0shortcut icon located on the Desktop to launch
the application.
5- The main window of Autopsy will appear.
8- Provide the Case Number and Examinerdetails, and click Finish button.
Note:The files that are marked with a red cross are the deleted files, which have
beenrecovered by Autopsy. Analyze the deleted files to find any suspicious
activities. It may also help in finding if the attacker has used any anti- forensic
techniques that delete files and folders after completion of given task.
19- The update-dev filestores data about login sessions of different users in the
Linux system. Select the update -dev file and clickon strings tab to view the file
information in textual format.
22- The dev file stores information about devices connected to the system. Click
the option to see information about different audio,media,etc., files connected
to the system.
25- Select the var folder from the left side menu. Expand the log folder from the
sub menu and select apt folder under it. The apt folder contains history.log
filethe stores history of actions performed.
26- Select the cups folder. It stores access logs, error logs, and page logs. Select the
access log option in the table tab to view the logs.
28- Select the results folder from left pane. It contains sections such as EXIF
Metadata files, Encrypted Content and
Extension MismatchDetected. Analyzethese files to look obfuscated malware files
as well as metadata files.
Lab A nalysis:
Analysis and document the results related to this experiment.
……………………………………………………………………………………………………
…………………………………………
……………………………………………………………………………………………………
…………………………………………
Lab Tasks:
Use Advanced IP Scanner tool to get various type of information about local network
computers
1.0 after download and install this tool we will see this user interface
169 | l
1.2 Click on scan , for result for all devices in network with it’s information
It’s contain three main options which’s Wake on LAN , Shut down , and abort shut
down
1.4 Click on Shut down you can use windows authentication to remotely access to this
victim device and shut down this device
Scan Information :
IP address
System Name
NetBIOS information
Manufacturer
Advanced IP
Scanner System status
The objective of this lab is to help students determine and list all the T C P/IP and UDP ports o
f a local computer.iIn this lab you need to:
Scan the system for currently opened TCP/IP and UDP ports
Gather information 011 die ports and p ro ce sse s that are opened
List all the IP a d d re sse s that are currendy established connections
Close unwanted TCP connections and kill the process that opened the ports.
Lab Environment:
This Lab requires:
You can also download the latest version of CurrPorts from the link
http: / / www.nirsoft.11e t/utils/cports.html
• If we want view only the selected report as HTML page, select reports and click
View>HTML Reports-
Selected Items., see the screenshot
• To save report from the web browser, click File > Save Page, see the screenshot
• The Properties window displays all the properties for the selected port, see the
screenshot
177 | P a g e
• If there is TCP connection we think is suspicious, just close it, see the screenshot
178 |
• After we Finish , Exit the Currports tool , see the screenshot
Lab Analysis:
Scanned Reports:
■ Process Name
■ Process ID
■ Protocol
CurrPorts
■ Local Port
■ Local Address
■ Remote Port
■ Remote Porn Name
■ Remote Address
■ Remote Host name
2-Analyze and evaluate the output results by creating a filter that displays only the
opened ports in the Firefox browser.
3. Determine the use of each of the following options that are available under the
options menu of
CurrPorts :
a. Display Established
b. Mark Ports of Unidentified Applications
c. Display Items Without Remote Address
d. Display Items with Unknown State
Lab Tasks:
• The main page of Nmap - Zenmp are displayed , see the screenshot
• Nmap scans the provided IP address with Intense scan and displays the scan result, see
the screenshot
• View Nmap topology for the provided IP address in the Intense scan Profile, see the
screenshot
• Scans tab to scan details for provided IP addresses , see the screenshot
• We enter Xmas Scan in the Profile name text field , see the screenshot
• Select None in die Non-TCP scans , and select Aggressive (-T4) in the Timing template,
After that click save changes see the screenshot
• Nmap display results on the Nmap Output tab , see the screenshot
• Null scan works only if the operating system’s TCP/IP implementation is developed
according to RFC 793.in a null scan, attackers send a TCP frame to a remote host with NO Flags.
To perform a null scan for a target IP address, we need to create a new profile, see the
screenshot
191 | P a g e
• We enter Null Scan in the Profile name text field , see the screenshot
• In the Scan tab, select Null scan (-sN) from the TCP scan , see the screenshot
• Nmap display results on the Nmap Output tab , see the screenshot
194 | P a g e nual
195 | P a g e Digital Forensics Technology & Practices Lab Manual
• In Host Details tab , view the details of hosts, such as Host Status, Addresses, see the
screenshot
• We enter ASK Flag Scan in the Profile name text field , see the screenshot
• In the Scan tab, select ASK scan (-sA) from the TCP scan , see the screenshot
197 | P a g e
• On Ping tab , check IPProto probes (-PO) to probe the IP address, then click Save Changes ,
see the screenshot
• We Enter the IP address in Target field, select the ASK Flag scan from the Profile click Scan,
see the screenshot
• Nmap display results on the Nmap Output tab , see the screenshot
198 | P a g e anual
• To view more details regarding the hosts, On Host Details tab, see the screenshot
Lab Analysis:
■ MAC Address
■ Operating System Details
■ Uptime Guess
■ Network Distance
■ TCP Sequence Prediction
199 | P a g e Digital Forensics Technology & Practices Lab Manual
■ IP ID Sequence Generation
■ Service Info
Questions:
1. Analyze and evaluate the results by scanning a target network using tealth Scan (Half-
open Scan)
2. Perform Inverse TCP Flag Scanning and analyze hosts and services for a target
machine in the network.