CF Lab
CF Lab
Certificate
INSTITUTION VISION
INSTITUTION MISSION
M1: To provide competent technical manpower capable of meeting the global industrial
requirements through excellence in education.
M2: To establish Center of Excellence on the cutting-edge technologies that initiate new ideas,
leading to the emergence of innovators, leaders, and entrepreneurs.
M3: To instill the highest level of self-confidence, professionalism, academic excellence, and
engineering.
DEPARTMENT OF COMPUTER SCIENCE AND ENGINEERING
(CYBER SECURITY)
DEPARTMENT VISION
To develop eminent engineers, researchers and entrepreneurs in the areas of Computer Science and
Engineering (Cyber Security) with exceptional technical expertise, skills and ethical values, capable of
providing innovative solutions to national and global needs.
DEPARTMENT MISSION
M1: To create a vibrant environment where all academicians, entrepreneurs and researchers are
brought together
M2: To create perpetual learning atmosphere for students and faculty members and establish research
centre for innovative conduct researches in emerging areas
M3: To create a platform for socially relevant technical and domain researches through funded
projects
iii
TABLE OF CONTENTS
iv
EX NO:1
STUDY AND EXPLORE THE FOLLOWING FORENSIC
TOOLS
DATE: 10/3/25
Aim:
Study of Computer Forensics and different tools used for forensic investigation
5
These three suites are comprised of multiple tools and reporting features and can be
fairly expensive. While these suites are widely used by law enforcement, they use the
same or similar techniques as the free open-source suites without the fancy interfaces.
By using the open-source and free suites, we can come to understand how such tools as
EnCase work without the expense. EnCase is the most widely used tool by law
enforcement, but not necessarily the most effective and sophisticated. These tools are
designed for user-friendliness, efficiency, certification, good training, and reporting.
There are a number of the free, open-source forensic suites, including the following
three.
1. The Sleuthkit Kit (TSK)
2. Helix
3. Knoppix
6
Some of the better tools in BackTrack include the following, among many others.
Digital forensics can do many things, all of which the aspiring hacker should be
aware of. Below is a list of just some of the things.
• Recovering deleted files, including emails
• Determine what computer, device, and/or software created the malicious
file, software, and/or attack
• Trail the source IP and/or MAC address of the attack
• Track the source of malware by its signature and components
• Determine the time, place, and device that took a picture
• Track the location of a cell phone enabled device (with or without GPS enabled)
• Determine the time a file was modified, accessed or created (MAC)
• Crack passwords on encrypted hard drives, files, or communication
• Determine which websites the perpetrator visited and what files he downloaded
• Determine what commands and software the suspect has utilized
• Extract critical information from volatile memory
• Determine who hacked the wireless network and who the unauthorized users are
7
And that' just some of the things you can do with digital forensics!
What is Anti-Forensics?
Anti-forensics are techniques that can be used to obfuscate information and evade the tools
and techniques of the forensic investigator. Some of these techniques include the
following.
• Hiding Data: Hiding data can include such things as encryption
and steganography.
• Artefact wiping: Every attack leaves a signature or artefact behind. Sometimes
it's wise to attempt to wipe these artefacts from the victim machine so as to leave
no tell-tale trail for the investigator.
• Trail Obfuscation: A decent forensic investigator can trail nearly any remote
attack to an IP address and/or MAC address. Trail obfuscation is a technique that
leads them to another source of the attack, rather than the actual attack.
• Change the timestamp: Change the file timestamp (modify, access, and
change) to evade detection by forensic tools.
Forensics tool. Autopsy is a digital forensics platform and graphical interface to The
Sleuth Kit® and other digital forensics tools. It can be used by law enforcement,
military, and corporate examiners to investigate what happened on a computer. You
can e v e n use it to recover photos from your camera's memory card.
8
CAINE (Computer Aided Investigative Environment)
Explorer Suite
Suite of executable file forensics utilities.
RESULT:
The forensic tools were successfully studied and explored. The functionalities, features, and applications of
each tool were understood through practical implementation.
10
EX NO:2
RECOVER DELETED FILES USING FTK IMAGER
DATE: 17/3/25
Aim:
How to Recover Deleted Files using Forensics Tools.
11
Right-click on the malicious file and select delete. If you put the file in the Recycle Bin,
you have made it even easier for the forensic investigator to recover. The Recycle Bin is
actually simply a folder where the files are moved until you empty the Recycle Bin.
Nothing is deleted until you empty the Recycle Bin.
Step 3: Create an Image
The first step a forensic investigator will do when examining your computer is to make a
bit-by-bit copy of your hard drive or in this case your flash drive. There are numerous
tools that can do this and in Linux, we have the dd command that does an excellent job
of making bit-by-bit copies (it's on all Linux distributions including Backtrack). File
backups and copies are not forensically sound as they will not copy deleted files and
folders and, in many cases, will actually change the data.
Most forensic investigators use commercial tools. The two most popular being Encase
by Guidance Software and Forensic Tool Kit by Access Data.
FTK, as it is commonly known in the industry, has a free imager that creates a bit-by-bit
copy of the drive. This imager is probably the most widely used in the industry and its
price is right, so let's use it.
You can download it here.
Now that have downloaded the FTK imager, we need to create a bit-by-bit image of the
flash drive.
12
was designed for law enforcement and all evidence needs to be categorized and labelled.
Finally, it will ask for a location of the physical drive you want to image, a destination
directory and a name for the image file. When you are done with all these
administrative tasks, FTK Imager will begin the process of creating a forensically
sound bit-by-bit image of your drive.
Now that we've created an image of the flash drive, we are ready to recover the deleted
files.
Step 4: Recover Deleted Files
There are many tools on the market to recover deleted files and all of them are adequate
to do the job. Deleted file recovery is probably the simplest of forensic tasks. Here, I
will be using a trial version of RecoverMyFiles.
You can download a trial version here.
Once you have installed RecoverMyFiles, select the Start Recovery icon in the upper
left corner. It will ask you to select either Recover Files or Recover Drive. Select
Recover a Drive. It will then search and display all your drives like that in the
screenshot below. Since we are using a forensic image, select Add Image button to the
right. You will need to provide a path to your image file
created with FTK.
13
Once you select an image file, start the automatic file recovery. When the recovery is
completed, you will see a screen similar to the one below.
I then selected the File Type tab above the Explorer window to categorize the files
by type.
As you can see, there are numerous file types recovered from this flash drive. Since
our malicious document was a .txt, I have selected the TXT UTF-16 file type. It then
puts all 158 .txt files on display in the upper right window. As you can see, it has
recovered our malicious.txt file and everything on it. Busted!
14
I'm hoping that this tutorial clearly showed you how simple it is for a forensic
investigator to recover the files you have deleted. This should be a lesson that you
need to be exceedingly cautious and when possible, overwrite any deleted files to
remove evidence. In some cases, even that may not be enough to keep your files
from a skilled forensic investigator.
RESULT:
The experiment to recover deleted files using FTK Imager was successful. The tool effectively restored the
original data through forensic image analysis.
15
EX NO:3 ACQUIRE FORENSIC IMAGE OF HARD DISK USING
ENCASE FORENSICS IMAGER AND ALSO PERFORM
DATE: 24/3/25 INTEGRITY CHECKING/VALIDATION
Aim:
To study the steps for hiding and extract any text file behind an image file/ Audio file using
Command Prompt.
Any file like .rar .jpg .txt or any file can be merged inside another file. In a simple
way, we shall learn how to hide a text file inside an image file using the Command
Prompt.
How to Hide the FILE?
Suppose you have to hide a text file “A.txt” with the image file “B.jpg” and combine
them in a new file as “C.jpg”.Where “C.jpg” is our output file which contains the
text hidden in the image file.
16
4. in cmd first type the code as follows:
>cd desktop
NOTE: this code is for assigning the location on cmd to desktop
5. Now type the following code:
"C.jpg" is the output image inside this out image our file is hidden
How to retrieve the file?
1. locate C.jpg file from where you want to retrieve text data
2. Right-click and open with notepad
Done! Successfully opened! In the last of the notepad, you’ll find the content of the
text file.
13
echo "Your Message">>"image.jpg"
Now the message is successfully hidden in the image file.
To view the message: Open with Notepad, at last, you’ll find the Your Message
Another Method
1. Open Run command window by pressing win + r.
2. Open command prompt by typing cmd and press OK
Windows 7/10: Shift+right click in the folder containing the files will open the
command prompt in that directory Windows: Open command prompt (start->run
cmd), then use cd to get to the folder where the files are stored.
Linux: You know what to do, open terminal and move to the directory containing
files.
14
We now need to merge these files together, but we want to use a binary merge
to keep the two files intact. With Windows copy command this uses the /B
switch. (Binary Data)
Windows
Code:
You should now have gained a new file called newfile.mp3. This should look
identical to the sound you started with when opened with a media player, but with a
secret payload hidden within. Here is the example sound containing a ZIP:
The two simplest ways to get your data back out of these files is to either change the
extension from .mp3 to .zip or to open your chosen ZIP program and open
newfile.mp3 within that. You should now be presented with your original files.
RESULT:
The experiment to acquire a forensic image of a hard disk using EnCase Forensic Imager was successful.
Integrity validation confirmed the image was accurate and unaltered.
15
EX NO:4
RESTORE THE EVIDENCE IMAGE USING ENCASE
FORENSICS IMAGER
DATE: 31/3/25
Aim:
How to Restoring the Evidence Image using EnCase Imager Open Encase Imager and add the
evidence to Encase imager
Browse to the image (. E01) file and add it to the case. The evidence added will get listed
Double click on the image, select he files to be restored and select the restore option located under Device
option.
16
When we click on restore, connect the drive where we want to restore the image and
click next. All the drives will be read. All the drives will be displayed, select the drive
where the image is to be restored. Use the blank drive for restoring the image as the
existing data will be wiped.
17
Type “Yes” in the text box and click on OK this will wipe the existing data on the
drive and start with the image restoration.
Image Restoration will start, we can check the progress on the lower right corner of the
window.
Once the restoration is complete, we can see the data in the drive we have selected.
To ensure the integrity of the data, we can see the report section on the bottom pane
and check the hash values. The hash values should be the same as of the image (we
can check the original hash value in the image report.)
If required we can copy and save the report in any text / word file for any future
reference.
RESULT:
The experiment to restore the evidence image using EnCase Forensic Imager was successful. The restored data
Matched the original, ensuring evidence integrity.
1
9
EX NO:5A STUDY THE FOLLOWING:
(A) COLLECT EMAIL EVIDENCE IN VICTIM PC
DATE: 7/4/25
Aim
How to make the forensic image of the hard drive using EnCase Forensics.
Introduction
The best approach for this matter is to use a disk imaging tool. Choosing and using
the right tool is very important in computer forensics investigation.
Disk imaging
In backup, ambient data will not be copied. This is an area where the most important
source for the evidence could be found. Ambient data is a data stored in Windows
swap file, unallocated space and file slack.
Scenario: Mr. X is suspected to be involved in selling his company’s confidential
data to the competitors, but without any evidence, no action could be taken against
him.
To get into reality and proof Mr. X guilty, the company has requested the forensic
services and have come to know all the relevant data is present inside the desktop
provided to him.
Since it is never advised to work with the original evidence because we may lose
some relevant data accidentally, so we will create an image of the original evidence
and work on it further.
This way the original evidence is safe and the integrity and authenticity of the evidence could be
proved through hash values
Step-01:
To image the computer hard drive, we will use Encase Imager. EnCase Imager is a
software which is bundled with numerous features which aid in all the four phases of
forensic investigation i.e. Collection, Preservation, Filtering and Report.
First, download the Encase Imager demo from here and install in your computer.
Once it is installed, Initialize the Software in Enterprise Mode.
2
1
Click On Finish.
Step 3: View the Case by Clicking On Case 1 <Case Name>
Step 4: Click on add local device for Adding Devices to Your Case. If there is any write
blocker attached with the machine and digital deice then tick to 1,2 and 5 option otherwise
untick to all and click on Next button.
Step 5: Tick in the box of name column which shows the connected device name
or label like (1,2,3 or any numeric number) and click on the finish button.
2
3
Step-06: Now to open evidence click on label number of the device which shows in
“name” column and again right-click on label number and choose acquire the option.
Step-07: Then a pop up will appear with three tabs. In the location tab, fills all the fields. In
format tab if you want to encrypt the evidence file then enable the Compression field otherwise
disable it. In Verification Hash field value should be chosen MD5 and SHA1 after it click on OK
button. File format selected here is E01 as this is supported by multiple tools and is suitable for
further analysis. If we want to password protect/encrypt our image we can do this at this stage.
2
5
Step-08: After it, image creation will be start and time taken to create
the image will be shown on the right side of the bottom. you can check
the status of image acquisition on the same window at the lower right
corner along with the time remaining (refer below image).
Step-09: Device will automatically disconnect after creating the image. The image will save in
the folder which we set the path earlier. Once the acquisition is complete the image will get
saved to the output folder (refer below image).
RESULT:
The experiment to collect email evidence from the victim PC was successfully completed. Relevant emails were
identified and preserved for further analysis.
EX NO:5B
EXTRACT BROWSER ARTIFACTS
(CHROMEHISTORY VIEW FOR GOOGLE CHROME)
DATE: 7/4/25
Aim:
How to Extracting Browser Artifacts
Chrome History View: is a small utility that reads the history data file of Google
Chrome Web browser, and displays the list of all visited Web pages in the last days.
For each visited Webpage, the following information is displayed: URL, Title, Visit
Date/Time, Number of visits, number of times that the user typed this address
(Typed Count), Referrer, and Visit ID.
Chrome Cache View: Chrome cache view is a small utility that reads the cache
folder of Google Chrome Web browser, and displays the list of all files currently
stored in the cache.
For each cache file, the following information is displayed:
URL, Content type, File size, Last accessed time, Expiration time, Server name, Server
response, and more. You can easily select one or more items from the cache list, and
then extract the files to another folder, or copy the URLs list to the
clipboard.
2
7
IEHistoryView: This utility reads all information from the history file on your
computer, and displays the list of all URLs that you have visited in the last few days.
It also allows you to select one or more URL addresses, and then remove them from
the history file or save them into text, HTML or XML file.
IECacheView: IECacheView is a small utility that reads the cache folder of Internet
Explorer, and displays the list of all files currently stored in the cache. For each
cache file, the following information is displayed: Filename, Content Type, URL,
Last Accessed Time, Last Modified Time, Expiration Time, Number of Hits, File
Size, Folder Name, and full path of the cache
filename.
RESULT:
The experiment to extract browser artifacts using ChromeHistoryView for Google Chrome was successful.
Relevant browsing data was retrieved and preserved for analysis.
2
9
EX NO:6
USE USBDEVIEW TO FIND THE LAST CONNECTED
USB TO THE SYSTEM
DATE: 21/4/25
Aim:
To find the Last Connected USB on your system (USB Forensics)
USBDeview
USBDeview is a small utility that lists all USB devices that currently connected to
your computer, as well as all USB devices that you previously used.
For each USB device, extended information is displayed: Device name/description,
device type, serial number (for mass storage devices), the date/time that device was
added, VendorID, ProductID, and more…
USBDeview also allows you to uninstall USB devices that you previously used,
disconnect USB devices that are currently connected to your computer, as well as to
disable and enable USB devices.
You can also use USBDeview on a remote computer, as long as you log in to that
computer with admin user.
PROCEDURE
RESULT:
The experiment to use USBDeview to find the lastly connected USB to the system was successfully completed
and verified
EX NO:7
PERFORM LIVE FORENSICS CASE INVESTIGATION
USING AUTOPSY
DATE: 5/5/25
Aim:
To perform Live Forensics Case Investigation using Autopsy
First Download autopsy from here and install in your pc. Click ‘New Case’ option.
3
1
A new page will open. Enter the details in ‘Case Name’ and ‘Base Directory’ and
choose the location to save the report e.g. :Autoreport. Then click on next to proceed
to the next step.
Here in the next step, you have to enter the case number and Examiner details and
click on finish to proceed to the next step.
A new window will open. It will ask for the add data source in Step 1. Select source type to add &
browse the file Path and click on NEXT option to proceed further
Configure ingest Modules I have chosen all the modules as I am looking for complete
information on evidence device or disk or system etc. and click next to proceed
further.
In Add Data Source just click on Finish to generate the report of the device and you
can perform complete investigate on the victim device or system or any other disk. It
will process the data Source and add it to the local database.
After Process completion, it will show the Forensic Investigation Report. Now click
on Devices Attached option, it will show the list of the attached device with the
system.
Now click on EXIF Metadata (Exchangeable image file format for images, sound
used by Digital Camera, Smartphone and scanner), click on Installed Programs to
see
35
the entire installed programs in the system, Click Operating System Information. It
will show the entire operating system list, Now Select Operating System User
Account Option. It will Display the name of all the user Accounts, Now click on
Recent Documents Option, it will display the latest created or opened documents,
Click Web Bookmarks Option to see all the bookmarks by system users in different
browsers, To see web cookies, select web cookies option, To See Web Downloads,
Click on Web Downloads option, To check internet History, click on Web History
Option, To see the history of internet search, click on Web Search Option, To see
the list of all email ids in the system, click on email address.
RESULT:
The experiment to perform Live Forensics Case Investigation using Autopsy is successfully executed
and verified
36
EX NO:8
STUDY EMAIL TRACKING AND WRITE A REPORT
ON THEM.
DATE: 12/5/25
Aim
To study and understand the concepts, methodologies, applications, and ethical considerations of
email tracking and email tracing, highlighting their significance in communication, marketing,
cybersecurity, and investigative processes.
Introduction
Email communication is a vital aspect of modern personal and professional interactions. With the
growing reliance on email, understanding how to monitor and analyze email activities has become
increasingly important. Email tracking and email tracing are two related but distinct techniques that
serve this purpose. This report explores the concepts, methodologies, applications, and ethical
considerations of email tracking and tracing.
1. Objective:
o Learn to implement email tracking using tracking pixels and link tracking.
2. Procedure:
1. Select a tool such as Mailtrack or HubSpot for email tracking.
2. Compose an email and embed a tracking pixel within the content. For example,
if using HubSpot, enable the "track email opens" option before sending.
3. Add a hyperlink in the email (e.g., "Click here to visit our website") and enable
click tracking.
4. Send the email to a test recipient or group.
5. Monitor the tool's dashboard to observe metrics like open rates and click-
through rates.
3. Expected Outcome:
o Gain insights into recipient engagement, such as knowing if the email was opened
or links were clicked.
1. Objective:
o Understand how to extract and analyze email headers to identify metadata.
2. Procedure:
1. Open an email in your email client (e.g., Gmail, Outlook).
2. Locate the email header. In Gmail, click the three-dot menu on the email and
select "Show original."
3. Copy the header content.
37
4. Paste it into an Email Header Analyzer tool, such as MXToolbox Header Analyzer.
5. Analyze the decoded metadata, including sender’s IP, mail servers, and
timestamps. For example, identify the "Received" lines to trace the path.
3. Expected Outcome:
o Successfully trace the route of the email through its originating IP and mail servers.
1. Objective:
o Learn to trace an email’s source using IP and DNS lookup tools.
2. Procedure:
1. Extract the IP address of the sender from the email header. For example, look for
the last "Received" line containing an IP address.
2. Use a reverse DNS lookup tool, such as MXToolbox, to find the domain
name associated with the IP address.
3. Utilize an IP geolocation tool (e.g., IP Tracker) to map the IP address to
its geographic location.
4. Document the findings, including the sender’s approximate location and domain
details. For instance, trace an email from "[email protected]" to its
originating IP and identify its location.
3. Expected Outcome:
o Determine the sender’s approximate location, ISP, and domain details.
1. Objective:
o Reflect on the ethical implications of email tracking and tracing.
2. Procedure:
1. Research privacy laws such as GDPR and CCPA.
2. Identify real-world scenarios where email tracking or tracing might raise ethical
concerns. For example, consider the use of tracking in unsolicited marketing
emails.
3. Discuss findings with peers or document them in a report.
4. Propose guidelines for ethical practices in email monitoring, such as obtaining
user consent.
3. Expected Outcome:
o Develop a clear understanding of responsible practices, including when and
how tracking should be disclosed.
RESULT:
The experiment to study email tracking and preparing a report was completed
38
successfully. A detailed report was prepared explaining their concepts and
technique
39