NIST Hacking Case
NIST Hacking Case
Scenario
• On 09/20/04 , a Dell CPi notebook computer, serial # VLQLW, was
found abandoned
• it has a wireless PCMCIA card and an external homemade 802.11b antennae.
• It is suspected that this computer was used for hacking purposes
• It may be tied to a hacking suspect, Greg Schardt.
• Schardt also goes by the online nickname of “Mr. Evil”
• Some of his associates have said that he would park his vehicle within
range of Wireless Access Points (like Starbucks and other T-Mobile
Hotspots) where he would then intercept internet traffic, attempting
to get credit card numbers, usernames & passwords.
Goal: is Greg Schardt a hacker?
• Find
• Any hacking software if there are any
• Usage of evidence software
• Any data that might have been generated.
• intercepted internet traffic, credit card numbers, usernames & passwords
• Attempt to tie the computer to the suspect.
Get DD images
Download DD images
Check MD5
2. What operating system was used on the
computer?
Show partitions (NTFS) and unallocated space using mmls
Extract software, which contains OS information saved in Win registry
Find regrip plugin
Find winver
3. When was the OS install date?
• See previous slide
• InstallDate 2004-08-19 22:48:27Z
4. What is the timezone settings?
Search for “system”
$ To the end of the line.
Extract “system”
Find timezone
5. Who is the registered owner?
6. What is the computer account name?
7. What is the primary domain (workgroup)
name?
• Windows domain is associated with workgroup
• and PC name, IP address
• Workgroup can be found in system event log
• We need to
• search workgroup in system event log
• extract the event log
• find a tool to parse the event log
• find domain information
Dump system event log
Download evtparse
Test evtparse
Parse System Event log
find domain information, PC name, etc.
8. When was the last recorded computer
shutdown date/time?
9. How many accounts are recorded (total
number)?
• All Windows user account names, SIDs (Security Identifiers), login
counts, creation dates, last password change dates, groups, and much
more can be found in the Windows Registry SAM (Security Account
Manager) file.
10. What is the account name of the user who
mostly uses the computer?
• Same as question 9
Method 1
shutdown
Method 2
epoch to a date
12. Proves that Greg Schardt is Mr. Evil
• A search (on local PC) for the name of “Greg Schardt” reveals multiple
hits. One of these proves that Greg Schardt is Mr. Evil and is also the
administrator of this computer. What file is it? What software
program does this file relate to?
• Approach
• Search “Greg” and check if the name associated with “Evil”
• In order to search, we need to mount the DD image
Create a mounting point
Setup a loop device
Observation:
• look@lan is a software because it was installed under the “Program
Files” folder
• look@lan has a configuration file named “irunin.ini”
• The initial config file has owner and user name information.
• The config file has a setup log
Search for the string “evil”
Other evidence may helpful:
Search both key words “”Evil” and “Greg”. The search results show Evil is associated with yahoo web visits.
13. List the network cards used by this
computer
14. This same file reports the IP address and
MAC address of the computer. What are they?
• list all files contain IP address
• list all files contain MAC address
• Find intersection of two files
egrep or grep –E: Run grep with extended regular expressions.
-r: Recursively search
I: ignore binary file
l: only list file name
nothing
Looking for Forte Agent configuration files or data
Find news server configuration
List all files that are associated with outlook express by searching the key work “outlook”
Find the news server:news.dallas.sbcglobal.net in the .dbx (outlook express format)
19. What two installed programs show this
information?
20. List 5 newsgroups that Mr. Evil has
subscribed to?
21. Investigate an Internet Relay Chat
program
A popular IRC (Internet Relay Chat) program called MIRC was installed.
What are the user settings that was shown when the user was online
and in a chat channel?
• Find new applications installed
• Find the application installation directory
• Search for configuration files or key words
Find mIRC installation
directory
Find some important configuration
uniq options:
-c, --count
prefix lines by the number of occurrences
sort options:
-n, --numeric-sort
compare according to string numerical value
-r, --reverse
reverse the result of comparisons
27. Yahoo mail saves copies (web cache) of
the email under what file name?
Search email under Mr. Evil’s account
View cached webpages
28. How many executable files are in the
recycle bin?
29. Are these files really deleted?
• No. They can be restored.
• We will try to recover the deleted files’ information
Recover deleted files’ information
• Extract deleted file from Windows Recycle Bin
• using Rifiuti2
• Rifiuti2 is a for analyzing Windows Recycle Bin INFO2 file.
• The complete path and file or folder name is stored in a hidden file called
INFO2 which is inside the Recycled or Recycler folder.
• Rifiuti2 can extract
• file deletion time,
• original path
• size of deleted files ad
• whether the trashed files have been permanently removed.
rifiuti2 features
• Handles oldest (Win95) to newest (Win 10 and Server 2019) recycle
bin format
• Windows 95 – 2003 uses a single index file named INFO or INFO2
• Vista or above uses one index file for each deleted item
• 64-bit file size support
• Supports all localized versions of Windows — both Unicode-based
ones and legacy ones (using ANSI code page)
• Supports output in XML format as well as original tab-delimited text
• Obscure features such as recycle bin on network share (\\server\share)
Install rifiuti2
Install using apt