Lab 05: Using Forensics Tools To Examine Windows Image
Lab 05: Using Forensics Tools To Examine Windows Image
OVERVIEW
To be an expert forensic investigator, you must have sound knowledge of various tools.
Instructions
(i) This is an INDIVIDUAL assessment.
(ii) Submit your answer in Moodle. Name your file as stated in the Activities.
SOFTWARE
To complete this activity, you will have to download and install software, WinHex.
WinHex: https://www.x-ways.net/winhex/
SOFTWARE
To complete this activity, you will have to download software, Notepad++ and WinHex.
Notepad++: https://notepad-plus-plus.org/downloads/v7.9/
WinHex: https://www.x-ways.net/winhex/
SOFTWARE
To complete this activity, you will have to download software, ProDiscover Basic.
• File name: ProDiscoverRelease8202Basicx86.exe
In this activity, you are required to wipe the contents of a USB drive by using ProDiscover Basic:
1. Insert a USB drive containing files you don’t need.
2. Right click the ProDiscover Basic and click Run as administrator to start ProDiscover
Basic. Click Yes in the User Account Control message box.
3. In the Launch Dialog box, click the “Don’t show this dialog” in the future check box and
then click Cancel to close the Open dialog box. Click Tools, Secure Wipe from the
ProDiscover menu.
4. In the Secure Wipe Disk dialog box, click the Disk to Wipe list arrow, and click the drive
letter corresponding to the USB drive. Verify that you have selected the correct drive letter
to prevent accidentally erasing any other attached storage device. In the Number of Passes
list box, type 3, and then click Start to begin the process.
5. Click OK in the ProDiscover message box to bypass the warning that all data will be
securely wiped. The Securely Deleting file message is displayed in the lower-left corner to
indicate that disk files are being wiped.
6. When the disk has been wiped THREE times, you see the message “The selected disk has
been securely wiped”. Click OK and exit ProDiscover Basic.
7. Open File Explorer, and then right click the USB drive and click Format.
8. In the Format dialog box, click NTFS in the File system list box and type EVIDENCE in
the Volume label text box. Click Start to format the USB drive. Click OK in the Format
Removable Disk message box.
9. When the format is finished, click OK in the Formatting Removable Disk message box,
and close the Format dialog box. Your USB drive is ready to be your original source of
digital evidence or destination drive.
CSCB544/CCSB5223 Computer Forensics 5
TASK 5: USING PRODISCOVER BASIC
Manager Steve Billings has been receiving complaints from customers about the job performance
of one of his sales representatives, George Montgomery. George has worked as a representative
for several years. He’s been absent from work for two days but hasn’t called in sick or told anyone
why he wouldn’t be at work. Steve asks the IT Department to confiscate George’s hard drive and
all storage media in his work area.
He wants to know whether any information on George’s computer and storage media might offer
a clue to his whereabouts and job performance concerns. To help determine George’s whereabouts,
you must take a systematic approach, described in the following section, to examining and
analyzing the data found on George’s desk.
OBJECTIVES:
• To create a new digital forensics investigation case.
• To analyze the acquired data.
• To generate a report.
Manager Steve Billings has been receiving complaints from customers about the job performance
of one of his sales representatives, George Montgomery. George has worked as a representative
for several years. He’s been absent from work for two days but hasn’t called in sick or told anyone
why he wouldn’t be at work. Steve asks the IT Department to confiscate George’s hard drive and
all storage media in his work area.
He wants to know whether any information on George’s computer and storage media might offer
a clue to his whereabouts and job performance concerns. To help determine George’s whereabouts,
you must take a systematic approach, described in the following section, to examining and
analyzing the data found on George’s desk.
OBJECTIVES:
• To create a new digital forensics investigation case.
• To analyze the acquired data.
• To generate a report.
1. Create a working folder and download Mont.dd file in the working folder.
2. Start Autopsy for Windows. In Autopsy’s main window, click the New Case button. In the
New Case Information window, enter MontCase01 in the Case Name text box, and click
Browse next to the Base Directory text box. Navigate to and click your working folder.
Make sure the Single-user option button is selected for Case Type, and then click Next.
3. In the Optional Information window, type MontCase01 in the Case Number text box and
YOUR NAME in the Examiner text box, and then click Finish to start the Add Data
Source Wizard.
4. In the Select Type of Data Source to Add window, click the Select data source type list
arrow, and click Disk Image or VM file. Click Next.
5. Click the Browse button next to the “Path” text box, navigate to and click your working
folder and the Mont.dd file, and then click Open. Click Next.
6. Keep the default settings in the Configure Ingest Modules window. Click Next and then
Finish.
1. In the Tree Viewer pane on the left, click to expand Views, File Types, By Extension, and
Documents.
2. Under Documents, click Office. In the Result Viewer (upper-right pane), click the first file,
Billing Letter.doc, to display its contents in the Content Viewer (lower-right
pane).
3. Right-click Billing Letter.doc, point to Add File Tag, and click Tag and
Comment.
4. In the Select Tag dialog box, click the New Tag Name button. In the New Tag section,
type Recovered Office Documents in the Tag Name text box, click OK, and then click
OK again.
5. In the Result Viewer pane, Ctrl+click Billing Letter.doc, Income.xls,
Regrets.doc, f0000000.doc, and f0000049.doc to select these files, and then
release the Ctrl key. Right-click the highlighted files, point to Add File Tags and then click
Recovered Office Documents.
6. Under Documents in the Tree Viewer pane, click Plain Text to display more recovered
files.
7. In the Result Viewer pane, select the files listed in Step 5 again, right-click the selection,
point to point to Add File Tags and then click Follow Up.
CSCB544/CCSB5223 Computer Forensics 10
Activity 6.3: Analyze Data and Search Related Information
The method for locating evidentiary artifacts is to search for specific known data values. All the
searchable data values are referred to as “keywords”. For George Montgomery case, you need to
find any files associated with George Montgomery. Find any reference to the name “George”:
1. Click the Keyword Search button at the far upper right, type George in the text box, and
then click Search.
2. In the Result Viewer pane, a new tab named Keyword search 1 opens. Click each file to
view its contents in the Content Viewer. Look for files containing the name “George.”
3. Click the Keyword Lists button at the far upper right, click the Email Addresses check
box, and then click Search.
1. If you exited Autopsy, start it again, and click Open Recent Case. Click MontCase01 and
then click Open. In Autopsy’s main window, click the Generate Report button at the top.
2. In the Generate Report window, select Results – Excel Report and click Next. Select
Mont.dd to be included in the report, click Next. Select All Results, click Finish. Once the
report generation progress is completed, click Close. Retrieve your Excel report in the
directory.
Additional info:
The files on George’s USB drive indicate that he was conducting a side business on his company
computer. Now that you have retrieved and analyzed the evidence, in a real investigation, you
need to find the answers to the following questions to write the final report:
• How did George’s manager acquire the disk?
• Did George perform the work on a laptop, which is his own property? If so, did he conduct
business transactions on his break or during his lunch hour?
• At what times of the day was George using the non-work-related files? How did you
retrieve this information?
• Which company policies apply?
• Are there any other items that need to be considered?
CSCB544/CCSB5223 Computer Forensics 11
In the George Montgomery case, you want to show what evidence exists proving that George had
his own business registering domain names. You should include a list of his clients’ names, his
income from this business, and any correspondence he wrote to clients about their accounts. The
time and date stamps on the files are during work hours, so you should include this information,
too. Eventually, you hand the evidence file to your supervisor or to Steve, George’s manager, who
then decides on a course of action.
REFERENCES:
Bill Nelson, Amelia Phillips, Chris Steuart (2019), Guide to Computer Forensics and
Investigations, Sixth Edition, Cengage Learning.
EC-Council Press (2010), Computer Forensics Evidence Collection & Preservation, Cengage
Learning
CSM Digital Forensics First Responder SOP
ASSESSMENT RUBRIC
Lab 5 Grading Criteria Maximum Points
Task 1 (Lab05_SW000000A1.jpeg) 5
Task 2 (Lab05_SW000000A2.txt) 5
Task 3 (Lab05_SW000000A3.txt) 5
Task 5 (Lab05_SW000000A5.jpeg) 5
Task 6 (Lab05_SW000000A6.xls) 5
Total: 25