Solving Computer Forensic Case Using Autopsy: Scenario
Solving Computer Forensic Case Using Autopsy: Scenario
This article focused on a particular case and a forensic tool to give you a ‘feel’ of
what computer forensics investigations are like. However, it is in no way
comprehensive enough to cover the variety of problems and complications faced
by the investigator.
Scenario
A complaint was made to the authorities describing alleged Wi-Fi hacking activity.
When the authorities reached the spot, they found an abandoned Dell computer
which is suspected that this computer was used for hacking purposes. Schardt
uses "Mr.Evil" nickname when he goes online.
He is also accused of parking his car in wireless range (like Starbucks and other
T-Mobile Hotspots) where he would then intercept internet traffic, attempting to
get credit card numbers, usernames & passwords. We're going to solve 20
important questions that will be related to this case by examining the images of his
computer.
Tasks performed:
My Blog:
https://qaishussainy.blogspot.com/
https://youtu.be/0TUHpYIscBA
Part 1: h
ttp://www.cfreds.nist.gov/images/4Dell%20Latitude%20CPi.E01
Part 2: h
ttp://www.cfreds.nist.gov/images/4Dell%20Latitude%20CPi.E02
https://github.com/sleuthkit/autopsy/releases/download/autopsy-4.14.0/autopsy-4.14.0-64bit.msi
Step 1:
After downloading the evidence disk and installing Autopsy, run Autopsy it and select New Case
Step 2:
Set a name for this case as i have set Mr.Evil and also set the location where you want to save
your forensic investigation data. click next and provide information but it's optional. click finish.
Step 3:
Select the first options Disk Image
Select the evidence disk image which you have downloaded before. i have created a separate
folder by the name of Forensic Case and pasted the disk images into it.
Note: Although both parts of the downloaded image are there in this folder, you will only see
the first part to select. Autopsy will automatically take the second part of the downloaded image.
Wait until all steps of analysis and integrity check loads completely.
make sure you have sufficient storage minimum 1GB otherwise the modules will not completely
load and the investigation will be incomplete.
So now let's start our investigation
We will find the solution for these given tasks from the disk image of the suspect.
Q11. Search for programs/tools that aided in the crime (Wireless Hacking)
Q16. A popular IRC (Internet Relay Chat) program called MIRC was installed. What are the
userid,
Q17. Ethereal, a popular “sniffing” program that can be used to intercept wired and wireless
internet packets was also found to be installed. When TCP packets are collected and
re-assembled, the default save directory is that users \My Documents directory. What is the
name of the file that contains the intercepted data?
Q20. What is the web-based email address for the main user?
How?
Click on Data source --> Select the image Dell Latitude CPi, E01 --> Click on Metadata
MD5: AEE4FCD9301C03B3B054623CA261959A
We check hash to see if the image is not altered or something is not added or not deleted from
the activities. It's very important because a single tamper to data would make an accused, guilty
or innocent.
How?
then on the right side click on software you can see the under Program Information tab which is
written Microsoft Windows XP.
then on the right side click on software you can see under the Date Time tab which is written
Microsoft Windows XP.
How?
then on the right side click on software you can see the under Owner tab which shows Greg
Schardt.
How?
then on the right side click on System you can see the under Name which it shows
N-1A9ODN6ZXK4LQ
How?
How?
The system will obtain the last user who logged on from the key ‘DefaultUserName’. This
information can be uncovered from the following path
How?
WINDOWS/SYSTEM32/CONFIG/SOFTWARE/MICROSOFT/WINDOWS NT/CURRENT
VERSION/WINLOGON/DEFAULT USER NAME
Ans9: Compaq WL110 Wireless LAN PC Card, Xircom CardBus Ethernet 100 + Modem 56
(Ethernet Interface).
How?
WINDOWS\system32\config\software\Microsoft\Windows NT\CurrentVersion\NetworkCards\
click on descriptions
How?
Click on Data Sources select 4Dell Latitude --> vol2 --> Program Files/Look@LAN/irunin.ini
Q11. Search for programs/tools that aided in the crime (Wireless Hacking)
1. Look@LAN
Look@Lan is an advanced network monitor that allows you to monitor your net in few clicks.
2. Cain
Cain and Abel is a password recovery tool for Microsoft Windows. It can recover many kinds of
passwords using methods such as network packet sniffing, cracking various password hashes
by using methods such as dictionary attacks, brute force and cryptanalysis attacks.
3. Network Stumbler
NetStumbler is a tool for Windows that facilitates detection of Wireless LANs using the
802.11b, 802.11a and 802.11g WLAN standards. It runs on Microsoft Windows operating
systems from Windows 2000 to Windows XP.
4. mIRC
5. Ethereal/Wireshark
Wireshark is a free and open-source packet analyzer. It is used for network troubleshooting,
analysis, software and communications protocol development, and education.
6. 123WASP
WASP will display all passwords of the currently logged in user that are stored in the Microsoft
PWL file.
How?
Ans12: Outlook Express, Forte Agent, MSN Explorer, MSN (Hotmail) Email
How?
WINDOWS\system32\config\software\clients\Mail
How?
Program Files\Agent\Data\Agent.ini
How?
Recycler
Ans15: Yes there is a zip bomb malware by the name of unix_hack.giz in this system.
How?
Click on Results --> Extracted Content --> Interesting Items --> Possible Zip Bomb
-->Interesting Files
Q16. A popular IRC (Internet Relay Chat) program called MIRC was installed. What are the
userid,
Program Files\mIRC\mirc.ini
Q17. E
thereal, a popular “sniffing” program that can be used to intercept wired and wireless
internet packets was also found to be installed. When TCP packets are collected and
re-assembled, the default save directory is that users \My Documents directory. What is the
name of the file that contains the intercepted data?
How?
Click on Data Sources select 4Dell Latitude --> vol2 --> Document and
Settings\Mr.Evil\intercerption
Click on Data Sources select 4Dell Latitude --> vol2 --> Document and
Settings\Mr.Evil\intercerption
scroll down and see User-Agent: Mozilla/4.0 (compatible; MSIE 4.01; Windows CE; PPC;
240x320)
you can also copy all texts from intercept file and search for the .com it will show you the
websites which were visited.
Q20. What is the web-based email address for the main user?
Ans20: m
[email protected] was found in web history.
How?
Conclusion
Computers Forensics is a vast field of study and includes topics like Processing Crime Scenes,
Operating Systems and File Structures, Recovering Graphic Files and Defeating Steganography,
Email Investigations, Mobile Device Investigations, Report Writing.