Rhino Hunt With Autopsy
Rhino Hunt With Autopsy
purpose :
Scenario :
• The city of New Orleans passed a law in 2004 making possession of nine or more unique
rhinoceros images a serious crime. The network administrator at the University of New
Orleans recently alerted police when his instance of RHINOVORE flagged illegal rhino
traffic. Evidence in the case includes a computer and USB key seized from one of the
University's labs. Unfortunately, the computer had no hard drive. The USB key was imaged
and a copy of the dd image is the case1.zip file you've been given.
• In addition to the USB key drive image, three network traces are also available ”these were
provided by the network administrator and involve the machine with the missing hard drive.
The suspect is the primary user of this machine, who has been pursuing his Ph.D. at the
University since 1972.
2
1 2
3 4
When the data file is imported and processed, in the left pane of Autopsy, expand the containers to
see the Images and "Deleted Files", as shown below
3
When the data file is imported and
processed, in the left pane of Autopsy,
expand the containers to see
the Images and "Deleted Files", as
shown below.
Find the image of a mother rhinoceros and
her child. That's the flag. (If you are using
an automated CTF scoreboard, enter the
filename of the image as the flag.)
Find the location of the missing hard drive. That's the flag.
There are two files containing an email address at MIT. Only one of the files has a real filename. (A
filename beginning with "Unalloc" is a fake filename generated by Autopsy for files recovered from
unallocated clusters.)
The flag is the real filename, which does not begin with "Unalloc"
philg@mit.edu
conclusion:
In this forensic exercise using Autopsy, we investigated a case involving illegal possession of
rhinoceros images at the University of New Orleans. We analyzed a disk image of a USB key and
network traces associated with the suspect's machine. The flag, indicating the image of a mother
rhinoceros and her child, was identified within the evidence files. Additionally, we confirmed the
absence of a hard drive in the system, which served as another flag. Moreover, an email address
associated with MIT was discovered within recovered files, providing an extra challenge. Through this
exercise, we practiced basic forensic techniques such as verifying hash values, extracting files from a
disk image, and examining deleted files to gather evidence and solve the case.
the end