Digital Forensics Fundamentals (Comp5061)
Digital Forensics Fundamentals (Comp5061)
Bournemouth University
Professor: Fudong Li
Submitted by
Name
Date
2
Part 1
Statement to the Jury about Data Integrity and Its Relevancy to a Digital Forensic
Investigation
Your honor, ladies and gentlemen of the jury, the “Global Data Privacy Laws” provide a
detailed explanation of international data privacy. According to international privacy law, the
term "data integrity" primarily refers to the coherence, accuracy, and timeliness of information,
along with the thoroughness of a specific dataset. It is crucial to consistently oversee this aspect
from the initial data acquisition and storage phases to the point of transfer or deletion.
trustworthiness of operational data. This assessment directly impacts the confidence with which
the data can be utilized for activities such as analysis and decision-making. Data integrity serves
as a measure of the reliability of information related to sales, inventory, marketing, finance, and
customer, influencing the overall quality of these crucial business components. Data integrity
guarantees that the presented information accurately reflects the real situation. For instance,
inaccuracies in inventory data could lead to undesirable stock levels, causing stockouts or
Within finance teams, the precision of held data plays a pivotal role in shaping the
efficiency of critical activities like budgeting, forecasting, analysis, and bank reconciliation.
Finance professionals are subject to intense scrutiny from stakeholders and regulatory bodies,
numerical data.
Digital data can be stored in diverse formats, such as mobile devices, cloud storage, hard
3
drives, and USB drives. Each format presents unique challenges, necessitating specialists to
possess suitable tools and techniques for accessing and analyzing the data effectively. Digital
data is susceptible to easy alteration, emphasizing the crucial role of ensuring data integrity
during forensic investigations. Forensic experts should apply diverse skills and techniques to
maintain the original state of the data, guaranteeing that it remains untouched and unaltered
Digital forensics is essential for investigating, indicting, and recovering from cybercrime.
It plays a vital role by providing crucial evidence that aids in identifying and apprehending
cybercriminals. Such digital evidence is acceptable in court and can be used to establish and
support a case. Digital forensics is useful for entities other than law enforcement, such as
vulnerabilities in their systems and networks that may have been targeted in data breaches.
Digital forensics becomes a proactive technique in preventing future data breaches and securing
sensitive information by recognizing and resolving these flaws. In the event of data loss,
corruption, or theft within an organization, digital forensic specialists can recover the data and
unchanged in any way by the digital forensic examiner. The integrity of digital evidence must be
maintained at all stages of its management. When possible, investigators or digital forensics
professionals should strive to establish that digital evidence remains unchanged throughout the
identification, collection, and acquisition phases. It is critical in the forensics laboratory to treat
“Item 650-457-42715-1.”
Background Information
On July 5, 2008, Alison Smith, the President of a business named m57.biz, informed law
enforcement that she was receiving phone calls from an individual attempting to extort money.
Around July 21, 2008 (exact date uncertain), Alison Smith observed confidential
included names, Social Security Numbers, and current salary details from m57.biz. Ms. Smith
promptly reported this incident to law enforcement, providing information that pointed towards
the possible involvement of the Chief Financial Officer, identified as Jean Jones.
On July 22, 2008, an Affidavit was submitted and sworn in the presence of the Honorable
Magistrate Joseph Albert Wapner. Subsequently, a Search Warrant was issued to search the
location identified as the residence of Jean Jones. (m57.biz has a lenient "work from home"
policy, enabling many employees to carry out their tasks from their own residences.
Consequently, a "work computer" assigned to Jean Jones by m57.biz is kept at her residence.)
During the search, several computers, including multiple portable hard drives, were seized.
examination on the confiscated evidence. The examination resulted in the discovery of a file
5
named m57biz.xlsx, which seemed to contain duplicated information from the competitor's
website. Subsequently, based on this finding, Jean Jones was charged with extortion. In 2009,
she underwent a trial and was convicted of extortion. Jean Jones is presently serving her sentence
in a federal prison.
reconsideration of Jean Jones's case, potentially resulting in a new trial. To support the prospect
of a retrial, the jury has requested second forensic examination of Jean Jones's computer’s hard
This is a report made after a digital forensic analysis on the evidence image extracted
from the computer belonging to Jean Jones, designated as evidence item 650-457-42715-1.
Special Agent G. Mann requested the forensic examination to uncover any information
indicating Jean Jones' potential involvement in extortion. The investigation also aims to ascertain
whether the spreadsheet labeled "m57biz.xlsx" was generated on Jean Jones' computer hard drive
the request seeks any pertinent details that may suggest the need to investigate individuals
Evidence Summary
2023. It is important to highlight that the examination of the evidence file nps-2008-
jean.E02 was not feasible. This limitation arose because the forensic tool utilized for the
examination did not support the image file. Following consultation with the case inspector
and legal counsel, the examination proceeded, focusing solely on inspecting the evidence
6
image nps-2008-jean.E01.
was uncovered through a metadata examination of the Excel file. Additionally, a review of
the user's sent and received email messages revealed a potential method for information
leakage. On the same day, the registry files of both the system and the users, along with data
evidence image was conducted to identify any other potential evidence contributing to a
holistic understanding. Furthermore, various attack vectors were considered, leading to the
formulation of hypotheses. These hypotheses were tested and resolved on December 19,
arose because only the initial evidence image was employed for the examination. Additional
noteworthy hash values include the MD5 hash of the Excel file, identified as "e23a 4eb7
f256 2f53 e88c 9dca 8b26 a153" during the examination, raising suspicions of potential
The evidence hard drive contains an image copy of a SYX Sytemax computer tower,
black with a grey front panel, identified by serial number 3XCD54ZX89. This drive was
handed over by John Anderson to the digital forensic examiner on December 15, 2023, at
10:00 AM, and subsequently returned on December 19, 2019, at 05:00 PM. The evidence
arose as the standard tool used for the examination did not support the image format. Further
7
analysis with alternative tools was not pursued to maintain adherence to the standard
Several technologies were used in the inquiry, including Autopsy (version 4.13.0), an
open-source digital forensic platform developed for in-depth examinations. Additionally, the
extraction and parsing of information (keys, values, data) from the Registry were carried out
using the open-source program RegRipper (version 2.8) for further analysis. The toolkit also
and watermarking. These tools were selected based on their alignment with industry
was employed to gather pertinent information. RegRipper CLI tool was utilized to analyze
and examine the files in the system registry, including, security, SAM, Software, System
and the “NTUSER.DAT” files of the users’ system. The crucial role of the OpenStego tool
was evident in the steganalysis process, focusing on the extraction of concealed data
By studying the logical file system, critical data such as sent and received email
messages, the detected suspicious Excel file, the user's general activity, and other significant
information about files in the evidence picture were uncovered. Files suspected of
encrypting were examined to determine the presence of concealed data. Furthermore, the
user's deleted data was examined, confirming that forensic techniques could recover these
files from the hard disk even if the user had attempted to remove them.
8
To speed up the study, unnecessary items such as operating system program files,
downloads required for application functionality, and sample photographs and videos with
modest file sizes were eliminated from the steganalysis. By reducing the scope to files with
more potential significance to the study, this concentrated strategy attempted to increase
efficiency.
Analysis
Temporal Analysis
1. Based on the Examination Request, it is evident that on July 5, 2008, Alison Smith,
the President of the business identified as m57.biz, informed law enforcement about
receiving threatening phone calls. The caller sought to extort money from her,
Despite Ms. Smith initially dismissing these threats as non-serious, the subsequent
events suggest that m57.biz may have been targeted by an attacker. This incident
could serve as an early indication of an impending attack, with the possibility that the
2. On July 19, 2008, at 1931H, “[email protected]” sent emails to “[email protected]” using the
requesting the provision of an Excel sheet containing Social Security Numbers for
background checks. The subject line of the email was "background checks." While no
9
tampering or spoofing of this email was observed, it is noted that this email might not
have originated from the actual [email protected], given that her emails were appearing
4. On July 19, 2008, at 19:43H, user [email protected] acknowledged that there was a
misconfiguration in the user's email and sent a message to “[email protected]” stating, "My
email is ‘[email protected],’ not Alex. Sorry about that." This communication serves as
additional evidence indicating that the previous message might not have originated from
5. On July 19, 2008, at 21:22H, “[email protected]” received another email purportedly from
“[email protected],” demanding the specified document. However, it was noted that the
email address was spoofed, and the actual sender was “[email protected].” There are
no indications in the email messages to suggest that Jean was aware of this
6. It is noted that “[email protected]” replied to spoofed email address from the Excel sheet on
7. The user "[email protected]" replied to the email with the subject "Thanks" on July
20, 2008, at 01:03H, confirming that the secret information had reached an unauthorized
user. It is now clear that this user may have disclosed sensitive information on the
competitor's website. This user's identity is unknown, although possibilities include being
8. At 20:10H on July 20, 2008, “[email protected]” commenced an email thread discussing the
10
including details such as salary and Social Security Number (SSN). The email exchange
suggests that the confidential information was revealed on a website around 20:10H on
9. The Examination Request notes, "On about 21 July 2008 (exact date uncertain), Alison
competitor's website. This information consists of names, Social Security Numbers, and
current salary information at m57.biz." Given the absence of other observed attack vectors
or a conclusive approach for the information leak, it is highly probable that the malicious
user [email protected] employed email spoofing to obtain and subsequently leak the
attached information.
Relational Analysis
The infiltrator might have been a dissatisfied employee of m57.biz, a hired attacker, or an
individual from a competitor's company. In this specific instance, the malicious user, identified
“[email protected]” and beseeching the file that was containing private data. The malevolent user
likely initiated a form of phishing attack to manipulate the email address of “[email protected]”
and dispatched an email to “[email protected]” requesting the spreadsheet. Exploiting the confusion
arising from email addresses and usernames, the attacker sent a fraudulent email posing as
[email protected], seeking the spreadsheet again. This tactic may have aimed to receive the
requested attachment directly in the inbox of the malicious user. [email protected] might have
unknowingly fallen for the ruse and sent the requested information in response to the malicious
11
user, resulting in the leakage of sensitive data. Subsequently, the attacker likely posted the
Functional Analysis
The evidence strongly suggests the high likelihood of the attack's successful
execution, as discerned through both temporal and relational analyses. The sequence of
events reveals pertinent insights. At 2008-07-19 19:31H, the email address [email protected]
EDT, the email concerning the spreadsheet was not addressed within the same thread.
Finally, at 2008-07-19 21:22H, [email protected] received the spoofed email, and the user
From a technical standpoint, the attack is technically feasible. A malicious user could
employ a phishing attack to deceive the user of the email address [email protected], leading
to the observed events. To ensure the comprehensive investigation of the case, it is essential
utilized by the business is crucial to verify the feasibility and capability of the attack. This
Conclusions
sensitive information like Social Security Numbers (SSN) and workers’ wages.
12
Nevertheless, it can be acknowledged that the user was unaware of spoofing emails.
The "m57biz.xls" spreadsheet was identified in two directories. (1) "/img nps-2008-
Jean’s computer hard drive and as an email attachment at “[email protected]”. The file
used to divulge private data, which was posted on the website of the competitor. It is
probable that the attacker adeptly reconfigured the email address "[email protected]"
From the existing digital evidence, it can be concluded that m57 employees were
unaware that they were being targeted by a malicious user. However, it is advisable
This investigation aims to uncover details about the email misconfiguration that took
place on July 19th and 20th, 2008. Such an inquiry is crucial for validating the
characteristics of the spear-phishing attack and the sequence of events leading to the
to provide a complete and clear picture, eliminating any uncertainties regarding the
References
Appendix
There were numerous files and directories within the evidence image hold significant
importance:
m57biz.xls
This Excel spreadsheet comprises sensitive information, including employee salaries and
Social Security Numbers for the business "m57.biz." The data was discovered to have been
leaked and appeared on the competitor's website. The file is located in two directories: "/imgnps-
jean.E01/vol2/DocumentsandSettings/Jean/LocalSettings/ApplicationData/Microsoft/Outlook/
outlook.pst"
In both directories, the MD5 hash value for this file is "e23a4eb7f2562f53e88c9dca
8b26a153." The file's author and creator are attributed to "Alison Smith," who crafted it on
Unfortunately, there is insufficient data available to comprehend how Jean acquired this
spreadsheet initially.
the RegRipper tool. The analysis revealed the existence of several other users on the
same system. Notably, besides Jean, another user named Devon had accessed their
account on the system. It was observed that the users had not altered their passwords
16
Similar to the SAM registry file, this file is also located in the directory
software. Notably, during the month of July (07), it was observed that the Microsoft Office
that multiple removable devices were connected to the system between July 20 and July 21.
E-Mail Messages:
This directory compiles all the emails found in the evidence image, obtained through
a forensic examination using the Autopsy tool. The email messages have provided insights
into the actual events that transpired on July 20 and 21. These messages encompass
attackers.
17
Figures