2016-S2-SEC601-Lab 15 / Computer Forensic Tools

Exercise 1: The Scene of the Crime + Exercise 2: Creating a Disk Image…                            …were done when tutor prepared the ‘Rogue.vhdx’ hard disk image file.

Exercise 3: Mounting the Disk Image and Creating a Disk Signature                           Mounted virtual disk file ‘Rogue.vhdx’ on laptop hard drive, drive letter (F:) with ‘read-only’ permissions

scsh3scsh1

Installed and started the ‘OSForensics’ program. Opening a new case, in order to investigate a disk from another machinescsh2

Calculated hash, created ‘Initial hash’ note and pasted the value into itscsh5

Exercise 4: Analysing the Image

In ‘Recent Activity’ – selected ‘Scan Drive’ button and drive letter ‘F:\’, then executed scanscsh6

Entered ‘new case item detail’ in list of selected itemsscsh7

Then entered ‘new case item detail’ in ‘list of all items’scsh8

Didn’t find file ‘Gamenet.rtf’ in ‘Deleted File Search’scsh9

Applied Filter, but no deleted executable files were foundscsh10

Results of deleted files, when sorted by ‘folder’ didn’t show any evidence of files from ‘GTSLABS’ folder having been deletedscsh11

Searching in the ‘mismatched file’ search, discovered that the ‘gamenet.txt’ file actually is identified as a ZIP archive…scsh12

Reviewed the case notes before closing down the ‘OSForensics’ programscsh13

Exercise 5: Completing the Lab

Leave a comment