FOCF
FOCF
Introduction 5
1. Computer Forensics Processes 7
1.1 Identification 8
1.2 Preservation 8
1.2.1 Collision of digital evidence 13
1.3 Analysis 21
1.4 Presentation 21
2. Types of forensic analysis 23
2.1 The Fruit of the Poisoned Tree Theory 24
3. Collecting evidence 27
3.1 Before starting 27
3.2 Differences between forensic copying and backup 29
3.2.1 RAM on Windows systems 34
3.2.2 RAM on Linux 35
3.3 Windows commands as forensic tools 38
3.3.1 ARP protocol tables 39
3.3.2 CMD history 40
3.3.3 Windows Network Configuration 41
3.3.4 Active connections in Windows 41
3.3.5 Scheduled tasks 44
3.3.6 System information 45
3.4 Browser history 45
3.5 Utilities 46
3.5.1 Agave 47
3.5.2 WinTriage 49
3.5.3 WinUFO 51
4. Forensic copying 52
4.1 Types of forensic copies 52
4.2 Forensic copy formats 53
4.3 Main challenges 55
4.4 Computer forensic hardware 60
4.4.1 Write blockers 60
3
4.4.2 Duplicators 62
4.5 Forensic copying of hard disks 64
4.5.1 Forensic copying with FTK Imager 64
4.5.2 Forensic copying with OSForensic 72
4.5.3 Forensic copying with HelixPro 73
4.6 Forensic copying from Linux 76
4.7 Live copy forensics, Windows systems 77
4.7.1 Detection of encrypted drives 79
4.7.2 Live copy forensics, encrypted Windows 87
environments
4.8 Hash calculation in Window 90
4.8.1 CMD 90
4.8.2 PowerShell 91
4.8.3 Multihasher 91
4.8.4 OSForensic 92
4.9 Hashing calculation in Linux 94
5. Forensic Lab 95
5.1 Free forensic suite 96
5.2 Autopsy Forensic 97
5.2.1 Creating a case 98
5.2.2 Adding evidence 100
5.2.3 Modules 103
5.2.4 Viewing Evidence 106
5.2.5 Timeline 110
5.3 Commercial Forensic Suite 111
6. Windows digital Investigation 117
6.1 Adding evidence 117
6.2 Mounting forensic copies 121
6.3 Existing users 126
6.4 Host 130
6.5 System Events 132
6.6 Prefetch 135
6.7 Shadowcopy 137
6.8 MFT 139
7. RAM Analysis 142
7.1 Volatility 142
7.1.1 Profiles 143
7.1.2 Processes and sub-processes 144
7.1.3 Inspection of used libraries 146
7.1.4 Extraction of executables 147
Index of illustrations 149
Computer Forensics Credentials 152
5
Introduction
• Identification
• Preservation
• Analysis
• Presentation
MD5: d41d8cd98f00b204e9800998ecf8427e
SHA-1: da39a3ee5e6b4b0d3255bfef95601890afd80709
SHA-256:
e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca
495991b7852b855
Similarities:
The fact that the hash integrity value uses letters in addition
to numbers makes it almost impossible for two completely
different items to match the hash integrity value.
d41d8cd98f00b204e9800998ecf8427e
First value is the letter "d", this first value could have been
a number from 0-9 or a letter from A-F (these are known as
hexadecimal values), this implies that there are 16 options
for the first value and is repeated with the second and last
character of the hash integrity value.
Differences:
image1.jpg
image 2.jpg
original.pdf
17
altered.pdf
Illustration 5 y 6 - SHA1 Collision
The detail that the algorithms have is the time and the
computer resources that are used for their calculation. The
19
3. Collecting evidence
If, on arrival at a site, the computers under study are on, the
RAM memory will be crucial, so we must proceed to extract
it.
31
• FTK Imager1
• OSForensic2
• Belkasoft Live RAM Capturer3
1 https://accessdata.com/product-download/
2 https://www.osforensics.com/download.html
3 https://belkasoft.com/ram-capturer
When you click it, a window will open, asking you to define
the destination path and the name to be assigned to the
memory dump file.
But all is not lost with respect to the items that are in RAM.
Inside the unit, there is a folder that keeps detailed
information on each of the processes: the folder is /proc.
When typing "ls" into /proc, we find that there are several
directories, and that the name of many of them is a number.
This is even more understandable if we run "ps" or one of
its variants, such as "ps aux", inside /proc.
Comando Descripción
Illustration 22 - CurrPorts
3.4.5 Scheduled tasks
• MozillaHistoryView
• ChromeHistoryView
• IEHistoryView
Illustration 25 –Chrome History View
3.5 Utilities
Many will ask why to get the information now and not in our
laboratory, working on the forensic copy? The answer is
very simple: extracting this information takes only a couple
of minutes. In this way, the reports can be brought back to
our lab for analysis, which saves us a lot of hours, and, in
several cases, we could have the answer to the
47
3.6.1 Agave
3.6.2 WinTriage
Illustration 27 - WinTriage
3.6.3 WinUFO
Let's look not at the history and data of disks, which we can
easily find on Wikipedia, but a look at the main types of
disks for forensic purposes.
PCIE: These disks have been on the market for years, their
massive use came about through Apple, which
incorporated them in its laptops and desktop computers, the
transfer rates of a copy are around 1,100 Mb/s.
59
• Wiebetech
• Tableau
4.4.2 Duplicators
1) Select 'hard disk' from the left menu, which will be the
one to copy.
FTK Imager reads the drives and indicates the file system
contained in each partition. Under "normal" circumstances,
and I am referring to the result of a manual installation with
the Windows default values, you should see something like
this.
83
Once the drive has been added, FTK Imager reads the
drives and displays the information about the files contained
in each partition and produces a manual installation with
Windows defaults.
We can see that the partitions are listed with a number (1)
followed by the corresponding size. The first of these are
very small, 100 and 16 Mb and refer to the Windows
operating system that creates them at the time of
installation. The one that is relevant in this case is the one
with a size of 91.5075 Mb and with the name "Basic data
partition". In this partition we can see that in the row below,
"NONAME" [NTFS] is indicated, the value of NTFS tells us
that the FTK tool was able to identify the file system and
could list all the items contained in the drive.
[NTFS] NTFS value tells us that the FTK tool was able to
identify the file system and could list all the items contained
on the drive.
85
Illustration 63 - BitLocker
87
Illustration 64 - BitLocker
4.8.1 CMD
4.8.2 PowerShell
4.8.3 Multihasher
4.8.4 OSForensic
sha256sum /home/file.txt
sha1sum /home/file.txt
md5sum /home/file.txt
5. Forensic lab
Then, a window opens to fill in the data for the new case. It
is important to note that the "Base Directory" path must be
on a storage medium independent of everything;
independent of the operating system, independent of the
hard disk containing the forensic copy, a hard disk only
reserved for storing temporary files (this was already
covered at the beginning of topic 5).
99
5.2.3 Modules
5.2.5 Timeline
• Technical support
• Speed
• Classification with AI
HKLM\SYSTEM\CurrentControlSet\Services\EventLog\
Application
HKLMM\SYSTEM\CurrentCurrentControlSet\Services\
EventLog\System
Files are originally in. evt format, of binary type. Now the
format is .evtx, which offers many improvements in
searchability.
6.6 Prefetch
6.7 Shadowcopy
It is possible that the system "did not find items that comply
with this feature", which is interpreted as, that disk does not
have snapshots. This is because, the space for such
snapshots was disabled as a way to save disk space.
\GLOBALROOTDEVICEHarddiskVolumeShadowCopy3
6.8 MFT
In this case I'm using Mft2Csv, which is totally free and has
a very powerful graphical interface.
We can scan existing disks, partitions or directly load a
$MFT file, only this is necessary for the tool to start the
interpretation process and give us .csv files that we can
open and apply the filters and column order that are most
important to us.
The .csv files will be created in the same folder where our
tool is located unless we indicate a specific path to the
program.
7.- RAM analysis
7.1 Volatility
7.1.1 Profiles
Index of illustrations
Number Description Page
1y2 MD5 Collision 13
3 MD5 collision demo 15
4 MD5 collision demo 15
5y6 SHA1 collision 16
7 Collision demo 18
8 Differences between backup and forensic 30
copy
9 y 10 RAM backup with FTK 32
11 y 12 Backup of RAM with Live RAM Capturer 33
13 Linux backup with dd 35
14 Linux RAM backup with dd 35
15 Access to /proc processes in Linux 37
16 Process listing in Linux 37
17 Windows commands applied to forensics 39
18 ARP protocol 40
19 CMD history 41
20 Network configuration 42
21 Active network connections 43
22 CurrPorts 43
23 Scheduled tasks 44
24 System information 45
25 Chrome history view 46
26 Agave Forensics 47
27 WinTriage 49
28 WinTriage options 50
29 WinUFO 51
30 SATA vs SAS disks 56
31 SCSI disks 57
32 USB hard drives 58
33 PCIE hard drives 59
34 M.2 hard drives 59
35 Tableau Blockers 61
36 Wiebetech Blockers 62
37 Tableau Tx1 Duplicator 63
38 SalvationData Data Copy King II 63
39 - 46 Forensic copy with FTK Imager 64-71
47- 49 Forensic Copy with OSForensic 72-73
50 y 51 Forensic copy with HelixPro 74-75
52 Listing of drives and mount points on Linux 76
53 y 54 Forensic backup on Linux with dd 76-77
55 Live copy forensics, Windows systems 79
56 Detection of encrypted drives with 80
MAGNET
57 - 62 Detection of encrypted drives with FTK 81-86
63 y 64 BitLocker 86-87
65 y 66 Live Forensic Copy, Encrypted Windows 88-89
Environments
67 Hash value calculation from CMD 90
68 Hash Value Calculation from PowerShell 91
69 Hashing with Multihasher 92
70 y 71 Hashing with OSForensic 92-93
72 Hashing from Linux 94
73 Forensic lab 95
74 y 75 Autopsy Forensic 98-99
76 - 79 Creating a case in Autopsy Forensic 100-
103
80 Modules in Autopsy Forensic 104
81 y 82 Processing in Autopsy Forensic 106
83 - 85 Viewing Evidence in Autopsy 107-
109
86 y 87 Timeline in Autopsy 110-
111
151
Disclaimer of Liability