CSA Preparing The IR Toolkit + Chpt9
CSA Preparing The IR Toolkit + Chpt9
Response Toolkit
CHAPTER 9
Digital forensics is the process of uncovering and interpreting electronic data. The goal of the
process is to preserve any evidence in its most original form while performing a structured
investigation by collecting, identifying and validating the digital information for the purpose of
reconstructing past events.
The context is most often for usage of data in a court of law, though digital forensics can be used in
other instances.
How does one duplicate or preserve evidence without knowing the duplication itself inherently
changed the data?
Time lines are critical for showing who did what, and when. But digital time stamps are notoriously
absent, or can easily be spoofed, in digital data.
In order to be able to state conclusively that Action A caused Result B, the concept of repeatability
must be introduced. This is very difficult with digital forensics.
Acquisition Utilities
The acquisition phase of a forensic investigation is perhaps the most critical point in terms of
ensuring admissibility of evidence, analysis and conclusions.
The following command will do a bit-for-bit copy of hard drive “had” to a file called case123.img using a block
size of 4096 bytes, and it will fill the rest of a block with null symbols if it encounters an error:
dd if =/dev/hda of=case123.img bs=4k conv=noerror, sync.
Note: this command does not generate a hash…why is the hash important?
The toolkit also includes a standalone disk imaging program called FTK Imager.
The FTK Imager is a simple but concise tool. It saves an image of a hard disk in
one file or in segments that may be later on reconstructed. It calculates MD5
hash values and confirms the integrity of the data before closing the files. The
result is an image file(s) that can be saved in several formats, including DD raw
DEMO: https://www.youtube.com/watch?v=OUORBch0zaE
Password hacking software has evolved tremendously over the last few years but essentially it comes down
to several thing: firstly, what systems are in place to prevent certain popular types of password cracking
techniques (for example ‘captcha forms’ for brute force attacks), and secondly, what is the computing
processing power of the hacker? Typically password hacking involves a hacker brute forcing their way into a
website admin panel (or login page for example) and bombarding the server with millions of variations to
enter the system. That requires CPU. Yes, a ‘clued-up’ Cybersecurity Professional will be able to prevent brute
forcing but you’ll be amazed at the amount of vulnerable websites that can be forced into with the password
hacking software that we’ve listed below.
Crack. Cain.
DaveGrohl. Hashcat. John the Ripper.
L0phtCrack. Ophcrack. RainbowCrack.
https://www.concise-courses.com/hacking-tools/password-crackers/
CYBERSECURITY ANALYSIS - UCC 16
Cryptography tools
Cryptography is a method of storing and transmitting data in a particular form so that only those
for whom it is intended can read and process it.
Cryptography is closely related to the disciplines of cryptology and cryptanalysis. Cryptography
includes techniques such as microdots, merging words with images, and other ways to hide
information in storage or transit. However, in today's computer-centric world, cryptography is
most often associated with scrambling plaintext (ordinary text, sometimes referred to as
cleartext) into ciphertext (a process called encryption), then back again (known as decryption).
Individuals who practice this field are known as cryptographers.
A popular tool is VeraCrypt, this tool is FREE and available for
windows, OS X, and Linux Systems. VeraCrypt support, AES,
TwoFish, and Serpent.
The most popular hashing algorithms for forensics analysis are MD5 and SHA-1, and they are supported by all popular
tools we discussed so far.
https://www.digitalvolcano.co.uk/hash.html
CYBERSECURITY ANALYSIS - UCC 19
Verifying Images
FTK
As widely used as Encase, claim to have a more intuitive interface. The tool is built on top of a database management
system, it is able to access large volumes of data efficiently.
Autorun locations
Most recently used lists
Wireless networks
Pg 193 - 194