<?xml version="1.0" encoding="UTF-8"?><rss version="2.0"
	xmlns:content="http://purl.org/rss/1.0/modules/content/"
	xmlns:wfw="http://wellformedweb.org/CommentAPI/"
	xmlns:dc="http://purl.org/dc/elements/1.1/"
	xmlns:atom="http://www.w3.org/2005/Atom"
	xmlns:sy="http://purl.org/rss/1.0/modules/syndication/"
	xmlns:slash="http://purl.org/rss/1.0/modules/slash/"
	>

<channel>
	<title>Computer Forensics &#8211; @Forensicxs</title>
	<atom:link href="https://www.forensicxs.com/tag/computer-forensics/feed/" rel="self" type="application/rss+xml" />
	<link>https://www.forensicxs.com</link>
	<description>Ethical Hacking &#124; Cybersecurity</description>
	<lastBuildDate>Thu, 13 May 2021 19:45:46 +0000</lastBuildDate>
	<language>en-US</language>
	<sy:updatePeriod>
	hourly	</sy:updatePeriod>
	<sy:updateFrequency>
	1	</sy:updateFrequency>
	
	<item>
		<title>Computer Forensics : Network Case using Wireshark and NetworkMiner</title>
		<link>https://www.forensicxs.com/computer-forensics-network-case-using-wireshark-and-networkminer/</link>
					<comments>https://www.forensicxs.com/computer-forensics-network-case-using-wireshark-and-networkminer/#comments</comments>
		
		<dc:creator><![CDATA[Forensicxs]]></dc:creator>
		<pubDate>Sat, 14 Nov 2020 15:40:46 +0000</pubDate>
				<category><![CDATA[Blog]]></category>
		<category><![CDATA[Computer Forensics]]></category>
		<category><![CDATA[Digitalcorpora]]></category>
		<category><![CDATA[Harassment]]></category>
		<category><![CDATA[Lily Tuckrige]]></category>
		<category><![CDATA[Network]]></category>
		<category><![CDATA[Networkminer]]></category>
		<category><![CDATA[Nitroba]]></category>
		<category><![CDATA[State University]]></category>
		<category><![CDATA[Wireshark]]></category>
		<guid isPermaLink="false">https://www.forensicxs.com/?p=919</guid>

					<description><![CDATA[In this article, I&#8217;m going to show you how to use Wireshark, the famous network packet sniffer, together with NetworkMiner, another very good tool, to perform some network forensics. You can easily download and install Wireshark here https://www.wireshark.org/download.html, on a Windows 10 machine for example, and NetworkMiner here https://weberblog.net/intro-to-networkminer/ I&#8217;m going to follow step by &#8230; <p class="link-more"><a href="https://www.forensicxs.com/computer-forensics-network-case-using-wireshark-and-networkminer/" class="more-link">Continue reading<span class="screen-reader-text"> "Computer Forensics : Network Case using Wireshark and NetworkMiner"</span></a></p>]]></description>
										<content:encoded><![CDATA[
<p id="Network-case-wireshark">In this article, I&#8217;m going to show you how to use <strong><span class="has-inline-color has-luminous-vivid-orange-color">Wireshark</span></strong>, the famous network packet sniffer, together with <strong><span class="has-inline-color has-luminous-vivid-orange-color">NetworkMiner</span></strong>, another very good tool, to perform some network forensics. You can easily download and install Wireshark here <a rel="noreferrer noopener" href="https://www.wireshark.org/download.html" target="_blank">https://www.wireshark.org/download.html</a>, on a Windows 10 machine for example, and NetworkMiner here <a href="https://weberblog.net/intro-to-networkminer/" target="_blank" rel="noreferrer noopener">https://weberblog.net/intro-to-networkminer/</a></p>



<p>I&#8217;m going to follow step by step a network forensics case, the Nitroba State University Harrassment Case. All the material is available here, published under the CC0 licence : <a href="https://digitalcorpora.org/corpora/scenarios/nitroba-university-harassment-scenario" target="_blank" rel="noreferrer noopener">https://digitalcorpora.org/corpora/scenarios/nitroba-university-harassment-scenario</a></p>



<p>This scenario includes two important documents</p>



<p>The first one is the presentation of the Case : <a href="http://downloads.digitalcorpora.org/corpora/network-packet-dumps/2008-nitroba/slides.ppt" target="_blank" rel="noreferrer noopener">http://downloads.digitalcorpora.org/corpora/network-packet-dumps/2008-nitroba/slides.ppt</a></p>



<p>The second one is the PCAP capture : <a href="http://downloads.digitalcorpora.org/corpora/network-packet-dumps/2008-nitroba/nitroba.pcap" target="_blank" rel="noreferrer noopener">http://downloads.digitalcorpora.org/corpora/network-packet-dumps/2008-nitroba/nitroba.pcap</a>. Read below about PCAP</p>



<figure class="wp-block-image size-large"><img fetchpriority="high" decoding="async" width="935" height="157" src="https://www.forensicxs.com/wp-content/uploads/2020/11/Capture.png" alt="" class="wp-image-928" srcset="https://www.forensicxs.com/wp-content/uploads/2020/11/Capture.png 935w, https://www.forensicxs.com/wp-content/uploads/2020/11/Capture-300x50.png 300w, https://www.forensicxs.com/wp-content/uploads/2020/11/Capture-768x129.png 768w" sizes="(max-width: 767px) 89vw, (max-width: 1000px) 54vw, (max-width: 1071px) 543px, 580px" /></figure>



<p><strong><span class="has-inline-color has-luminous-vivid-orange-color">Let&#8217;s have a first look at the PCAP file</span></strong></p>



<p>Just click on the PCAP file, and it should open in Wireshark. You get a first overview of the very long list of packets captured</p>



<figure class="wp-block-image size-large is-resized"><img decoding="async" src="https://www.forensicxs.com/wp-content/uploads/2020/11/Capture-2-1024x490.png" alt="" class="wp-image-930" width="847" height="405" srcset="https://www.forensicxs.com/wp-content/uploads/2020/11/Capture-2-1024x490.png 1024w, https://www.forensicxs.com/wp-content/uploads/2020/11/Capture-2-300x144.png 300w, https://www.forensicxs.com/wp-content/uploads/2020/11/Capture-2-768x368.png 768w, https://www.forensicxs.com/wp-content/uploads/2020/11/Capture-2-1536x736.png 1536w, https://www.forensicxs.com/wp-content/uploads/2020/11/Capture-2.png 1904w" sizes="(max-width: 767px) 89vw, (max-width: 1000px) 54vw, (max-width: 1071px) 543px, 580px" /></figure>



<p>In the first section, you get the list of packets/frames ordered by number, time, source IP, destination IP, protocol, length, and informations about content</p>



<p>In the second section, you see the details of a packet (here packet/frame number 1), shown according to the main layers of the <strong>OSI model</strong>. For packet number 1, we have informations about the first four layers (respectively n°1 &#8220;wire&#8221;, n°2 &#8220;Ethernet&#8221;, n°3 &#8220;IP&#8221;, n°4 &#8220;TCP&#8221;)</p>



<figure class="wp-block-image size-large is-resized"><img decoding="async" src="https://www.forensicxs.com/wp-content/uploads/2020/11/Capture-3.png" alt="" class="wp-image-931" width="534" height="388" srcset="https://www.forensicxs.com/wp-content/uploads/2020/11/Capture-3.png 795w, https://www.forensicxs.com/wp-content/uploads/2020/11/Capture-3-300x218.png 300w, https://www.forensicxs.com/wp-content/uploads/2020/11/Capture-3-768x558.png 768w" sizes="(max-width: 534px) 100vw, 534px" /></figure>



<p>In the third section, we have the details of the packet number 1 in HEX format. It is usefull to check the source data in a &#8220;compact&#8221; format (instead of binary which would be very long)</p>



<p>As a very first step, you can easily gather <strong>statistics</strong> about this capture, just using the statistics module of Wireshark : Statistics =&gt; Capture File Properties</p>



<figure class="wp-block-image size-large is-resized"><img decoding="async" src="https://www.forensicxs.com/wp-content/uploads/2020/11/Capture-4-1024x482.png" alt="" class="wp-image-932" width="660" height="310" srcset="https://www.forensicxs.com/wp-content/uploads/2020/11/Capture-4-1024x482.png 1024w, https://www.forensicxs.com/wp-content/uploads/2020/11/Capture-4-300x141.png 300w, https://www.forensicxs.com/wp-content/uploads/2020/11/Capture-4-768x362.png 768w, https://www.forensicxs.com/wp-content/uploads/2020/11/Capture-4.png 1081w" sizes="(max-width: 660px) 100vw, 660px" /></figure>



<p>We can see that the SHA1 and SHA256 hash signatures match with the ones given in the scenario (as expected). We also see that the elapsed time of the capture was about 4 hours and 22 minutes. This is quite long, and explains the quantity of packets received in this network capture : 94 410 lines. No chance to read through each packet line by line&#8230;this is why <strong>a key concept in Wireshark is to make use of filters</strong> to narrow down any search made in the capture. As you can guess, we are going to use filters for our analysis&#8230;!</p>



<p><strong><span class="has-inline-color has-luminous-vivid-orange-color">Map the Nitroba dorm room network</span></strong></p>



<figure class="wp-block-image"><img decoding="async" src="https://www.forensicxs.com/wp-content/uploads/2020/11/Capture-13.png" alt="This image has an empty alt attribute; its file name is Capture-13.png"/></figure>



<p>Now, read through the Powerpoint presentation to get an overview of the Case. There is one key information to start analyzing the PCAP capture</p>



<figure class="wp-block-image size-large is-resized"><img decoding="async" src="https://www.forensicxs.com/wp-content/uploads/2020/11/Capture-5.png" alt="" class="wp-image-934" width="520" height="87" srcset="https://www.forensicxs.com/wp-content/uploads/2020/11/Capture-5.png 885w, https://www.forensicxs.com/wp-content/uploads/2020/11/Capture-5-300x51.png 300w, https://www.forensicxs.com/wp-content/uploads/2020/11/Capture-5-768x129.png 768w" sizes="(max-width: 520px) 100vw, 520px" /></figure>



<p>The IP was found in the email header</p>



<figure class="wp-block-image size-large"><img decoding="async" width="933" height="374" src="https://www.forensicxs.com/wp-content/uploads/2020/11/Capture-20.png" alt="" class="wp-image-965" srcset="https://www.forensicxs.com/wp-content/uploads/2020/11/Capture-20.png 933w, https://www.forensicxs.com/wp-content/uploads/2020/11/Capture-20-300x120.png 300w, https://www.forensicxs.com/wp-content/uploads/2020/11/Capture-20-768x308.png 768w" sizes="(max-width: 767px) 89vw, (max-width: 1000px) 54vw, (max-width: 1071px) 543px, 580px" /></figure>



<p>So, let&#8217;s filter the PCAP file using the IP adress used to send the first email : 140.247.62.34, both in the source and destination IP : <strong>ip.src==140.247.62.34 or ip.dst==140.247.62.34</strong> (to learn the filtering by IP, check this : <a rel="noreferrer noopener" href="https://networkproguide.com/wireshark-filter-by-ip/" target="_blank">https://networkproguide.com/wireshark-filter-by-ip/</a>)</p>



<p>We find that this IP has a low presence in the Wireshark statistics : 0.06% of the total sent packets (equal 52 packets)</p>



<figure class="wp-block-image size-large is-resized"><img decoding="async" src="https://www.forensicxs.com/wp-content/uploads/2020/11/Capture-6.png" alt="" class="wp-image-936" width="529" height="88" srcset="https://www.forensicxs.com/wp-content/uploads/2020/11/Capture-6.png 619w, https://www.forensicxs.com/wp-content/uploads/2020/11/Capture-6-300x50.png 300w" sizes="(max-width: 529px) 100vw, 529px" /></figure>



<p>Now, look closer at the IP adresses source and destination (here below a screenshot of the first packets)&#8230;you see that the <strong>IP 192.168.15.4</strong> plays a central role as it is the only IP bridging with our IP 140.247.62.34</p>



<figure class="wp-block-image size-large is-resized"><img decoding="async" src="https://www.forensicxs.com/wp-content/uploads/2020/11/Capture-7.png" alt="" class="wp-image-937" width="488" height="333" srcset="https://www.forensicxs.com/wp-content/uploads/2020/11/Capture-7.png 575w, https://www.forensicxs.com/wp-content/uploads/2020/11/Capture-7-300x205.png 300w" sizes="(max-width: 488px) 100vw, 488px" /></figure>



<p>This type of IP is well known : it&#8217;s a <strong>private IP adress</strong>. See below some explanations</p>



<figure class="wp-block-image size-large is-resized"><img decoding="async" src="https://www.forensicxs.com/wp-content/uploads/2020/11/Capture-8.png" alt="" class="wp-image-939" width="610" height="118" srcset="https://www.forensicxs.com/wp-content/uploads/2020/11/Capture-8.png 707w, https://www.forensicxs.com/wp-content/uploads/2020/11/Capture-8-300x58.png 300w" sizes="(max-width: 610px) 100vw, 610px" /></figure>



<figure class="wp-block-image size-large is-resized"><img decoding="async" src="https://www.forensicxs.com/wp-content/uploads/2020/11/Capture-9.png" alt="" class="wp-image-940" width="610" height="576" srcset="https://www.forensicxs.com/wp-content/uploads/2020/11/Capture-9.png 710w, https://www.forensicxs.com/wp-content/uploads/2020/11/Capture-9-300x283.png 300w" sizes="(max-width: 610px) 100vw, 610px" /></figure>



<p>Let&#8217;s have a look in the OSI layer n°2 of a packet capture between these two IP adresses<strong> </strong>192.168.15.4 (source) and IP 140.247.62.34 (destination). We find interesting informations about the hardware and MAC adress of the two physical devices pointed by these IP</p>



<figure class="wp-block-image size-large"><img decoding="async" width="704" height="224" src="https://www.forensicxs.com/wp-content/uploads/2020/11/Capture-11.png" alt="" class="wp-image-943" srcset="https://www.forensicxs.com/wp-content/uploads/2020/11/Capture-11.png 704w, https://www.forensicxs.com/wp-content/uploads/2020/11/Capture-11-300x95.png 300w" sizes="(max-width: 704px) 100vw, 704px" /></figure>



<p>So, the information reads as follows </p>



<figure class="wp-block-table"><table><tbody><tr><td class="has-text-align-center" data-align="center"><strong>IP</strong></td><td class="has-text-align-center" data-align="center"><strong>MAC</strong></td><td class="has-text-align-center" data-align="center">       <strong>Hardware</strong>            </td></tr><tr><td class="has-text-align-center" data-align="center">192.168.15.4 (source)</td><td class="has-text-align-center" data-align="center">00:17:f2:e2:c0:ce</td><td class="has-text-align-center" data-align="center">Apple</td></tr><tr><td class="has-text-align-center" data-align="center">140.247.62.34 (destination)</td><td class="has-text-align-center" data-align="center">00:1f:d9:2e:4f:60</td><td class="has-text-align-center" data-align="center">HonHaiPr</td></tr></tbody></table></figure>



<p>A Google check with the MAC 00:17:f2:e2:c0:ce confirms this is an <strong>Apple</strong> device</p>



<figure class="wp-block-image size-large"><img decoding="async" width="980" height="899" src="https://www.forensicxs.com/wp-content/uploads/2020/11/image.png" alt="" class="wp-image-947" srcset="https://www.forensicxs.com/wp-content/uploads/2020/11/image.png 980w, https://www.forensicxs.com/wp-content/uploads/2020/11/image-300x275.png 300w, https://www.forensicxs.com/wp-content/uploads/2020/11/image-768x705.png 768w" sizes="(max-width: 767px) 89vw, (max-width: 1000px) 54vw, (max-width: 1071px) 543px, 580px" /></figure>



<p>What is HonHaiPr ? A carefull Google search reveals it&#8217;s Hon Hai Precision Industry Co Ltd, also known as the electronics giant <strong>Foxconn</strong></p>



<figure class="wp-block-image size-large"><img decoding="async" width="1024" height="275" src="https://www.forensicxs.com/wp-content/uploads/2020/11/Capture-12-1024x275.png" alt="" class="wp-image-948" srcset="https://www.forensicxs.com/wp-content/uploads/2020/11/Capture-12-1024x275.png 1024w, https://www.forensicxs.com/wp-content/uploads/2020/11/Capture-12-300x81.png 300w, https://www.forensicxs.com/wp-content/uploads/2020/11/Capture-12-768x206.png 768w, https://www.forensicxs.com/wp-content/uploads/2020/11/Capture-12.png 1270w" sizes="(max-width: 767px) 89vw, (max-width: 1000px) 54vw, (max-width: 1071px) 543px, 580px" /></figure>



<p><span class="has-inline-color has-luminous-vivid-orange-color"><strong>Find who sent email to lilytuckrige@yahoo.com</strong> <strong>and identify the TCP connections that include the hostile message</strong></span></p>



<p>Let&#8217;s use again the filter capabilities of Wireshark : <strong>frame contains &#8220;tuckrige&#8221;</strong></p>



<p>We find three packets . The first two of them are using the OSI model layer n°7, that is the application layer, represented by the <strong>HTTP protocol</strong>. The last one is using the OSI model layer n°4, in this case the <strong>TCP protocol</strong></p>



<figure class="wp-block-image size-large"><img decoding="async" width="1024" height="540" src="https://www.forensicxs.com/wp-content/uploads/2020/11/Capture-14-1024x540.png" alt="" class="wp-image-952" srcset="https://www.forensicxs.com/wp-content/uploads/2020/11/Capture-14-1024x540.png 1024w, https://www.forensicxs.com/wp-content/uploads/2020/11/Capture-14-300x158.png 300w, https://www.forensicxs.com/wp-content/uploads/2020/11/Capture-14-768x405.png 768w, https://www.forensicxs.com/wp-content/uploads/2020/11/Capture-14.png 1512w" sizes="(max-width: 767px) 89vw, (max-width: 1000px) 54vw, (max-width: 1071px) 543px, 580px" /></figure>



<p>The packet n°80614 shows an harassing message was sent using sendanonymousemail.net</p>



<figure class="wp-block-image size-large is-resized"><img decoding="async" src="https://www.forensicxs.com/wp-content/uploads/2020/11/Capture-15.png" alt="" class="wp-image-953" width="463" height="298" srcset="https://www.forensicxs.com/wp-content/uploads/2020/11/Capture-15.png 507w, https://www.forensicxs.com/wp-content/uploads/2020/11/Capture-15-300x193.png 300w" sizes="(max-width: 463px) 100vw, 463px" /></figure>



<p>The source IP is 192.168.15.4, and the destination IP is 69.80.225.91</p>



<p>The packet n°83601 shows an harassing message was sent using <strong>Willselfdestruct.com</strong>, with the exact email header as described in the Powerpoint &#8220;you can&#8217;t find us&#8221;</p>



<figure class="wp-block-image size-large is-resized"><img decoding="async" src="https://www.forensicxs.com/wp-content/uploads/2020/11/Capture-16.png" alt="" class="wp-image-954" width="526" height="145" srcset="https://www.forensicxs.com/wp-content/uploads/2020/11/Capture-16.png 608w, https://www.forensicxs.com/wp-content/uploads/2020/11/Capture-16-300x83.png 300w" sizes="(max-width: 526px) 100vw, 526px" /></figure>



<p>The source IP is 192.168.15.4, and the destination IP is 69.25.94.22</p>



<p>At this point of the article, we can confirm that the IP 192.168.15.4 plays a central role in the email &#8220;attacks&#8221; and the harassment faced by the professor Lily Tuckrige</p>



<p>Let&#8217;s keep in mind this key information for the next paragraphs</p>



<figure class="wp-block-table"><table><tbody><tr><td class="has-text-align-center" data-align="center"><strong>IP</strong></td><td class="has-text-align-center" data-align="center"><strong>MAC</strong></td><td class="has-text-align-center" data-align="center">       <strong>Hardware</strong>            </td></tr><tr><td class="has-text-align-center" data-align="center">192.168.15.4 (source)</td><td class="has-text-align-center" data-align="center">00:17:f2:e2:c0:ce</td><td class="has-text-align-center" data-align="center">Apple</td></tr></tbody></table><figcaption>This IP / MAC is going to be essential to solve the case !</figcaption></figure>



<p><strong><span class="has-inline-color has-luminous-vivid-orange-color">Find information in one of those TCP connections that identifies the attacker</span></strong></p>



<p>So now that we have an interesting IP / MAC pair, that may lead to the identification of the attacker, what could we do next ?</p>



<p>I&#8217;ve decided to have a look further in the packets. Could we find maybe, the email adress of the attacker ? And, how to check that ?</p>



<p>I&#8217;ve just filtered in Wireshark typing &#8220;frame contains mail&#8221;. This is a little bit &#8220;quick and dirty&#8221; but could help to narrow down the research as I had no better idea at this point&#8230;then I went scrolling into the selected frames and found some frames titled &#8220;GET /mail/ HTTP/1.1 with some interesting content&#8230;look at the cookie ! They reveal some email adress and the link to the email platform used !</p>



<p>In the example below, we see the frame n°16744, showing a GET /mail/ HTTP/1.1, the MAC adress in layer 2 of the OSI model, and some cookie informations in clear text :</p>



<p><em>User-Agent: Mozilla/5.0 (Macintosh; U; PPC Mac OS X Mach-O; en-US; rv:1.8.1.16)</em></p>



<p><em>Cookie pair: gmailchat=elishevet@gmail.com/945167</em></p>



<p><em>[Full request URI: http://mail.google.com/mail/]</em></p>



<figure class="wp-block-image size-large"><img decoding="async" width="1024" height="472" src="https://www.forensicxs.com/wp-content/uploads/2020/11/Capture-19-1024x472.png" alt="" class="wp-image-963" srcset="https://www.forensicxs.com/wp-content/uploads/2020/11/Capture-19-1024x472.png 1024w, https://www.forensicxs.com/wp-content/uploads/2020/11/Capture-19-300x138.png 300w, https://www.forensicxs.com/wp-content/uploads/2020/11/Capture-19-768x354.png 768w, https://www.forensicxs.com/wp-content/uploads/2020/11/Capture-19-1536x707.png 1536w, https://www.forensicxs.com/wp-content/uploads/2020/11/Capture-19.png 1898w" sizes="(max-width: 767px) 89vw, (max-width: 1000px) 54vw, (max-width: 1071px) 543px, 580px" /></figure>



<p>Of course, the http adress points to the Gmail sign in page. When the person is signing in, Gmail downloads the cookie for authentification needs</p>



<figure class="wp-block-image size-large is-resized"><img decoding="async" src="https://www.forensicxs.com/wp-content/uploads/2020/11/Capture-17.png" alt="" class="wp-image-960" width="260" height="319" srcset="https://www.forensicxs.com/wp-content/uploads/2020/11/Capture-17.png 470w, https://www.forensicxs.com/wp-content/uploads/2020/11/Capture-17-245x300.png 245w" sizes="(max-width: 260px) 100vw, 260px" /></figure>



<p>It&#8217;s quite amazing to find this level of information in clear text, furthermore in Wireshark, isn&#8217;t it ? Well, not quite. Just read this blog and the summary below -&gt; enforce SSL so the cookie isn&#8217;t sent in cleartext ! </p>



<p><a href="https://blog.teamtreehouse.com/how-to-create-totally-secure-cookies" target="_blank" rel="noreferrer noopener">https://blog.teamtreehouse.com/how-to-create-totally-secure-cookies</a></p>



<figure class="wp-block-image size-large is-resized"><img decoding="async" src="https://www.forensicxs.com/wp-content/uploads/2020/11/Capture-18.png" alt="" class="wp-image-961" width="486" height="190" srcset="https://www.forensicxs.com/wp-content/uploads/2020/11/Capture-18.png 813w, https://www.forensicxs.com/wp-content/uploads/2020/11/Capture-18-300x118.png 300w, https://www.forensicxs.com/wp-content/uploads/2020/11/Capture-18-768x301.png 768w" sizes="(max-width: 486px) 100vw, 486px" /></figure>



<p>Now that we have found a way to identify the email adress of the attacker, let&#8217;s go through the different frames including the GET /mail/ HTTP/1.1 info and let&#8217;s check the email, IP, MAC data. Probably, we will find a match with the already suspicious IP/MAC pair from the previous paragraph ? Here below the result of my analysis in a table, the match is easily found and highlighted in red</p>



<figure class="wp-block-table"><table><tbody><tr><td class="has-text-align-center" data-align="center">Frame</td><td class="has-text-align-center" data-align="center">E-mail</td><td class="has-text-align-center" data-align="center">IP</td><td class="has-text-align-center" data-align="center">MAC</td></tr><tr><td class="has-text-align-center" data-align="center">16744</td><td class="has-text-align-center" data-align="center">elishevet@gmail.com</td><td class="has-text-align-center" data-align="center">192.168.1.64</td><td class="has-text-align-center" data-align="center">00:1d:d9:2e:4f:61</td></tr><tr><td class="has-text-align-center" data-align="center">78990</td><td class="has-text-align-center" data-align="center"><strong><span class="has-inline-color has-vivid-red-color">jcoach@gmail.com</span></strong></td><td class="has-text-align-center" data-align="center"><strong><span class="has-inline-color has-vivid-red-color">192.168.15.4</span></strong></td><td class="has-text-align-center" data-align="center"><strong><span class="has-inline-color has-vivid-red-color">00:17:f2:e2:c0:ce</span></strong></td></tr></tbody></table><figcaption>The attacker email is jcoach@gmail.com</figcaption></figure>



<p><strong><span class="has-inline-color has-luminous-vivid-orange-color">So who dit it ?</span></strong></p>



<p>Now, we can come to a conclusion, since we have a potential name &#8220;jcoach&#8221;. Let&#8217;s compare with the list of alumni in Lily Tuckrige classroom</p>



<figure class="wp-block-image size-large is-resized"><img decoding="async" src="https://www.forensicxs.com/wp-content/uploads/2020/11/image-1.png" alt="" class="wp-image-966" width="249" height="389" srcset="https://www.forensicxs.com/wp-content/uploads/2020/11/image-1.png 502w, https://www.forensicxs.com/wp-content/uploads/2020/11/image-1-192x300.png 192w" sizes="(max-width: 249px) 100vw, 249px" /></figure>



<p>We have a match with <strong>Johnny Coach</strong> ! We found the solution to this harassment case <img src="https://s.w.org/images/core/emoji/17.0.2/72x72/1f642.png" alt="🙂" class="wp-smiley" style="height: 1em; max-height: 1em;" /></p>



<p><strong><span class="has-inline-color has-luminous-vivid-orange-color">NetworkMiner versus Wireshark</span></strong></p>



<p>As we solved the case with Wireshark, let&#8217;s have a quick look what NetworkMiner could bring. Here a good summary available in Google </p>



<figure class="wp-block-image size-large"><img decoding="async" width="914" height="146" src="https://www.forensicxs.com/wp-content/uploads/2020/11/image-2.png" alt="" class="wp-image-967" srcset="https://www.forensicxs.com/wp-content/uploads/2020/11/image-2.png 914w, https://www.forensicxs.com/wp-content/uploads/2020/11/image-2-300x48.png 300w, https://www.forensicxs.com/wp-content/uploads/2020/11/image-2-768x123.png 768w" sizes="(max-width: 767px) 89vw, (max-width: 1000px) 54vw, (max-width: 1071px) 543px, 580px" /></figure>



<p>I will provide here below a few screenshots of what you can do to solve the case</p>



<figure class="wp-block-image size-large"><img decoding="async" width="1024" height="333" src="https://www.forensicxs.com/wp-content/uploads/2020/11/image-3-1024x333.png" alt="" class="wp-image-968" srcset="https://www.forensicxs.com/wp-content/uploads/2020/11/image-3-1024x333.png 1024w, https://www.forensicxs.com/wp-content/uploads/2020/11/image-3-300x98.png 300w, https://www.forensicxs.com/wp-content/uploads/2020/11/image-3-768x250.png 768w, https://www.forensicxs.com/wp-content/uploads/2020/11/image-3.png 1522w" sizes="(max-width: 767px) 89vw, (max-width: 1000px) 54vw, (max-width: 1071px) 543px, 580px" /><figcaption>NetworkMiner provides a very handy email analyzer. We immediately see the harassment messages</figcaption></figure>



<figure class="wp-block-image size-large"><img decoding="async" width="951" height="481" src="https://www.forensicxs.com/wp-content/uploads/2020/11/image-4.png" alt="" class="wp-image-969" srcset="https://www.forensicxs.com/wp-content/uploads/2020/11/image-4.png 951w, https://www.forensicxs.com/wp-content/uploads/2020/11/image-4-300x152.png 300w, https://www.forensicxs.com/wp-content/uploads/2020/11/image-4-768x388.png 768w" sizes="(max-width: 767px) 89vw, (max-width: 1000px) 54vw, (max-width: 1071px) 543px, 580px" /><figcaption>From the IP 192.168.15.4, we find the MAC adress and more</figcaption></figure>



<figure class="wp-block-image size-large"><img decoding="async" width="1024" height="184" src="https://www.forensicxs.com/wp-content/uploads/2020/11/image-5-1024x184.png" alt="" class="wp-image-971" srcset="https://www.forensicxs.com/wp-content/uploads/2020/11/image-5-1024x184.png 1024w, https://www.forensicxs.com/wp-content/uploads/2020/11/image-5-300x54.png 300w, https://www.forensicxs.com/wp-content/uploads/2020/11/image-5-768x138.png 768w, https://www.forensicxs.com/wp-content/uploads/2020/11/image-5.png 1519w" sizes="(max-width: 767px) 89vw, (max-width: 1000px) 54vw, (max-width: 1071px) 543px, 580px" /><figcaption>In the Credentials section, we can narrow down the email provider used by 192.168.15.4 to Gmail and confirm there is a single Gmail account corresponding to this IP, jcoach@gmail.com</figcaption></figure>



<p><strong><span class="has-inline-color has-luminous-vivid-orange-color">Conclusion</span></strong></p>



<p>Doing this exercise, we have discovered some good network packet sniffers, and now could be able to solve more difficult cases</p>



<p>We have seen that with a good packet sniffer, a lot of critical informations could be collected&#8230;in such case your personal informations are no longer safe</p>



<p>It was pretty straigthforward to come down to the attacker, thanks to the available email header, then basic filtering in Wireshark and/or NetworkMiner, applying the necessary keywords</p>



<p>Is such a scenario realistic ? Yes, it could be. A network Admin can install such networking sniffers and gather data, or an attacker could slip in a network and also gather informations</p>



<p>To protect yourself, avoid the non encrypted protocols such as HTTP, FTP, TELNET</p>



<p>You can get additional informations about sniffing attacks here : <a href="https://www.greycampus.com/blog/information-security/what-is-a-sniffing-attack-and-how-can-you-defend-it" target="_blank" rel="noreferrer noopener">https://www.greycampus.com/blog/information-security/what-is-a-sniffing-attack-and-how-can-you-defend-it</a></p>



<p>Update 2021/04/30 : please read the chat below, with the user &#8220;kinimod&#8221; as it shows a deeper complexity to the case !</p>
]]></content:encoded>
					
					<wfw:commentRss>https://www.forensicxs.com/computer-forensics-network-case-using-wireshark-and-networkminer/feed/</wfw:commentRss>
			<slash:comments>13</slash:comments>
		
		
			</item>
		<item>
		<title>Computer Forensics : Hacking Case using Autopsy</title>
		<link>https://www.forensicxs.com/computer-forensics-hacking-case-using-autopsy/</link>
					<comments>https://www.forensicxs.com/computer-forensics-hacking-case-using-autopsy/#comments</comments>
		
		<dc:creator><![CDATA[Forensicxs]]></dc:creator>
		<pubDate>Sun, 18 Oct 2020 21:03:57 +0000</pubDate>
				<category><![CDATA[Blog]]></category>
		<category><![CDATA[Autopsy]]></category>
		<category><![CDATA[Computer Forensics]]></category>
		<category><![CDATA[Hacking Case]]></category>
		<guid isPermaLink="false">https://www.forensicxs.com/?p=833</guid>

					<description><![CDATA[In the following articles, I will focus on Computer Forensics techniques. Instead of writing a general or theoretical article, I decided to search for test images and provide a technical walkthrough of simulated test images I found an excellent website for this : https://www.forensicfocus.com/challenges-and-images/, were you can practically train yourself to Computer Forensics. On the &#8230; <p class="link-more"><a href="https://www.forensicxs.com/computer-forensics-hacking-case-using-autopsy/" class="more-link">Continue reading<span class="screen-reader-text"> "Computer Forensics : Hacking Case using Autopsy"</span></a></p>]]></description>
										<content:encoded><![CDATA[
<p>In the following articles, I will focus on Computer Forensics techniques. Instead of writing a general or theoretical article, I decided to search for test images and provide a technical walkthrough of simulated test images</p>



<p>I found an excellent website for this : <a rel="noreferrer noopener" href="https://www.forensicfocus.com/challenges-and-images/" target="_blank">https://www.forensicfocus.com/challenges-and-images/</a>, were you can practically train yourself to Computer Forensics.  On the home page, please follow the link to the NIST website where you can access several test images : <a href="https://www.cfreds.nist.gov/" target="_blank" rel="noreferrer noopener">https://www.cfreds.nist.gov/</a></p>



<figure class="wp-block-image size-large is-resized"><img decoding="async" src="https://www.forensicxs.com/wp-content/uploads/2020/10/Capture-1024x361.png" alt="" class="wp-image-835" width="520" height="183" srcset="https://www.forensicxs.com/wp-content/uploads/2020/10/Capture-1024x361.png 1024w, https://www.forensicxs.com/wp-content/uploads/2020/10/Capture-300x106.png 300w, https://www.forensicxs.com/wp-content/uploads/2020/10/Capture-768x270.png 768w, https://www.forensicxs.com/wp-content/uploads/2020/10/Capture.png 1031w" sizes="(max-width: 520px) 100vw, 520px" /></figure>



<p>In this first article, I have taken a test image called &#8220;<strong><span class="has-inline-color has-luminous-vivid-orange-color">Hacking Case</span></strong>&#8220;. There has been several reviews of this case already with published solutions, so I hope that my article brings some value to you guys</p>



<figure class="wp-block-image size-large is-resized"><img decoding="async" src="https://www.forensicxs.com/wp-content/uploads/2020/10/Capture-1-1024x223.png" alt="" class="wp-image-836" width="612" height="132" srcset="https://www.forensicxs.com/wp-content/uploads/2020/10/Capture-1-1024x223.png 1024w, https://www.forensicxs.com/wp-content/uploads/2020/10/Capture-1-300x65.png 300w, https://www.forensicxs.com/wp-content/uploads/2020/10/Capture-1-768x167.png 768w, https://www.forensicxs.com/wp-content/uploads/2020/10/Capture-1-1536x334.png 1536w, https://www.forensicxs.com/wp-content/uploads/2020/10/Capture-1.png 1892w" sizes="(max-width: 612px) 100vw, 612px" /></figure>



<p>The scenario is the following</p>



<figure class="wp-block-image size-large is-resized"><img decoding="async" src="https://www.forensicxs.com/wp-content/uploads/2020/10/Capture-2-1024x190.png" alt="" class="wp-image-839" width="744" height="138" srcset="https://www.forensicxs.com/wp-content/uploads/2020/10/Capture-2-1024x190.png 1024w, https://www.forensicxs.com/wp-content/uploads/2020/10/Capture-2-300x56.png 300w, https://www.forensicxs.com/wp-content/uploads/2020/10/Capture-2-768x143.png 768w, https://www.forensicxs.com/wp-content/uploads/2020/10/Capture-2-1536x286.png 1536w, https://www.forensicxs.com/wp-content/uploads/2020/10/Capture-2.png 1876w" sizes="(max-width: 706px) 89vw, (max-width: 767px) 82vw, 740px" /></figure>



<p>This is quite vintage&#8230;so, an old Dell CPi notebook computer has been found and it is suspected that a so called hacking suspect &#8220;<strong><span class="has-inline-color has-luminous-vivid-orange-color">Greg Schardt</span></strong>&#8220;, is the owner of this device. A hard drive disc image has been generated and made available to us for analysis</p>



<figure class="wp-block-image size-large"><img decoding="async" width="1024" height="768" src="https://www.forensicxs.com/wp-content/uploads/2020/10/xcrh2te0h9941-1024x768.jpg" alt="" class="wp-image-840" srcset="https://www.forensicxs.com/wp-content/uploads/2020/10/xcrh2te0h9941-1024x768.jpg 1024w, https://www.forensicxs.com/wp-content/uploads/2020/10/xcrh2te0h9941-300x225.jpg 300w, https://www.forensicxs.com/wp-content/uploads/2020/10/xcrh2te0h9941-768x576.jpg 768w, https://www.forensicxs.com/wp-content/uploads/2020/10/xcrh2te0h9941-1536x1152.jpg 1536w, https://www.forensicxs.com/wp-content/uploads/2020/10/xcrh2te0h9941-2048x1536.jpg 2048w" sizes="(max-width: 767px) 89vw, (max-width: 1000px) 54vw, (max-width: 1071px) 543px, 580px" /></figure>



<p>Where to start from ? We have a disc drive image (split in 8 parts) and also an EnCase image&#8230;what is the difference ? Should we consider both in our analysis, or choosing one of the two images is ok ?</p>



<p>EnCase is one of the most popular computer forensic solution available : <a href="https://www.guidancesoftware.com/encase-forensic" target="_blank" rel="noreferrer noopener">https://www.guidancesoftware.com/encase-forensic</a>. It has far reaching capabilities for forensic analysis. An EnCase image was obtained using the EnCase Imager software : <a href="https://www.guidancesoftware.com/document/product-brief/encase-forensic-imager" target="_blank" rel="noreferrer noopener">https://www.guidancesoftware.com/document/product-brief/encase-forensic-imager</a></p>



<p>The final format of the image will be the same, either using the disc drive image or the EnCase image. It will be a file full of exotic symbols, that you can see by yourself just clicking on one of the image link : <a href="https://www.cfreds.nist.gov/images/4Dell%20Latitude%20CPi.E01" target="_blank" rel="noreferrer noopener">https://www.cfreds.nist.gov/images/4Dell%20Latitude%20CPi.E01</a></p>



<figure class="wp-block-image size-large is-resized"><img decoding="async" src="https://www.forensicxs.com/wp-content/uploads/2020/10/Capture-4-1024x448.png" alt="" class="wp-image-844" width="678" height="296" srcset="https://www.forensicxs.com/wp-content/uploads/2020/10/Capture-4-1024x448.png 1024w, https://www.forensicxs.com/wp-content/uploads/2020/10/Capture-4-300x131.png 300w, https://www.forensicxs.com/wp-content/uploads/2020/10/Capture-4-768x336.png 768w, https://www.forensicxs.com/wp-content/uploads/2020/10/Capture-4-1536x673.png 1536w, https://www.forensicxs.com/wp-content/uploads/2020/10/Capture-4.png 1882w" sizes="(max-width: 678px) 100vw, 678px" /></figure>



<p>What are these symbols ? These are just Unicode representation of the raw datas encoded into the Hard Disc Drive. It&#8217;s not quite human readable, it&#8217;s not meant to be in fact&#8230;a computer program will do it for you, interpreting the raw data into a human readable format. An Hex Editor will be a first step to represent this data into HEX format, in a more structured way (that&#8217;s just an example, no need to do this step to continue reading the article)</p>



<figure class="wp-block-image size-large is-resized"><img decoding="async" src="https://www.forensicxs.com/wp-content/uploads/2020/10/Capture-5-1024x213.png" alt="" class="wp-image-846" width="746" height="155" srcset="https://www.forensicxs.com/wp-content/uploads/2020/10/Capture-5-1024x213.png 1024w, https://www.forensicxs.com/wp-content/uploads/2020/10/Capture-5-300x63.png 300w, https://www.forensicxs.com/wp-content/uploads/2020/10/Capture-5-768x160.png 768w, https://www.forensicxs.com/wp-content/uploads/2020/10/Capture-5-1536x320.png 1536w, https://www.forensicxs.com/wp-content/uploads/2020/10/Capture-5.png 1665w" sizes="(max-width: 706px) 89vw, (max-width: 767px) 82vw, 740px" /></figure>



<p>So, as the raw images and the EnCase images are in the same format, I chose the EnCase one</p>



<p>I am using the Free Download Manager for this : <a href="https://www.freedownloadmanager.org/fr/" target="_blank" rel="noreferrer noopener">https://www.freedownloadmanager.org/fr/</a> Just copy the link of the image file into this tool and it will download the data into one file for you, pretty neat</p>



<figure class="wp-block-image size-large"><img decoding="async" width="1024" height="527" src="https://www.forensicxs.com/wp-content/uploads/2020/10/Capture-6-1024x527.png" alt="" class="wp-image-847" srcset="https://www.forensicxs.com/wp-content/uploads/2020/10/Capture-6-1024x527.png 1024w, https://www.forensicxs.com/wp-content/uploads/2020/10/Capture-6-300x154.png 300w, https://www.forensicxs.com/wp-content/uploads/2020/10/Capture-6-768x395.png 768w, https://www.forensicxs.com/wp-content/uploads/2020/10/Capture-6-1536x790.png 1536w, https://www.forensicxs.com/wp-content/uploads/2020/10/Capture-6.png 1909w" sizes="(max-width: 767px) 89vw, (max-width: 1000px) 54vw, (max-width: 1071px) 543px, 580px" /></figure>



<p>For the analysis of the image, I&#8217;m using the open source Autopsy software for Windows (no need to register to download) : <a href="https://www.autopsy.com/download/" target="_blank" rel="noreferrer noopener">https://www.autopsy.com/download/</a></p>



<p>The installation is pretty straightforward. Once it&#8217;s done, just start a new &#8220;Case&#8221; in Autopsy by loading the forensic image. You then land on the main screen of this nice software. On this home screen, you will find the image at the top left side. Just right click on it and select &#8220;View Summary Information&#8221;, and you will find some basic informations allowing to answer the first questions</p>



<figure class="wp-block-image size-large"><img decoding="async" width="1024" height="576" src="https://www.forensicxs.com/wp-content/uploads/2020/10/Capture-9-1024x576.png" alt="" class="wp-image-853" srcset="https://www.forensicxs.com/wp-content/uploads/2020/10/Capture-9-1024x576.png 1024w, https://www.forensicxs.com/wp-content/uploads/2020/10/Capture-9-300x169.png 300w, https://www.forensicxs.com/wp-content/uploads/2020/10/Capture-9-768x432.png 768w, https://www.forensicxs.com/wp-content/uploads/2020/10/Capture-9.png 1183w" sizes="(max-width: 767px) 89vw, (max-width: 1000px) 54vw, (max-width: 1071px) 543px, 580px" /></figure>



<p><strong>1.</strong> <strong><span class="has-inline-color has-luminous-vivid-orange-color">What is the image hash? Does the acquisition and verification hash match ?</span></strong></p>



<p>The hash is an MD5, it&#8217;s value is <strong>AEE4FCD9301C03B3B054623CA261959A</strong>. Just to remind, this is a unique identifier coming from an MD5 algorithm calculation applied to the file content. It allows a unique identification of the source file</p>



<p>However, the acquisition hash is not given, so I&#8217;m not able to compare acquisition and verification hash</p>



<p><strong>2. <span class="has-inline-color has-luminous-vivid-orange-color">What operating system was used on the computer ?</span></strong></p>



<p>You can see immediately that it&#8217;s a <strong>Windows XP</strong> operating system. I told you, it&#8217;s vintage !</p>



<p>Looking into the C:\boot.ini file, we find it&#8217;s a <strong>Professional</strong> version</p>



<figure class="wp-block-image size-large is-resized"><img decoding="async" src="https://www.forensicxs.com/wp-content/uploads/2020/10/Capture-11-1024x346.png" alt="" class="wp-image-857" width="787" height="265" srcset="https://www.forensicxs.com/wp-content/uploads/2020/10/Capture-11-1024x346.png 1024w, https://www.forensicxs.com/wp-content/uploads/2020/10/Capture-11-300x101.png 300w, https://www.forensicxs.com/wp-content/uploads/2020/10/Capture-11-768x259.png 768w, https://www.forensicxs.com/wp-content/uploads/2020/10/Capture-11-1536x519.png 1536w, https://www.forensicxs.com/wp-content/uploads/2020/10/Capture-11.png 1756w" sizes="(max-width: 767px) 89vw, (max-width: 1000px) 54vw, (max-width: 1071px) 543px, 580px" /></figure>



<p><strong>3. <span class="has-inline-color has-luminous-vivid-orange-color">When was the install date ?</span></strong></p>



<p>It seems that there was initially a Windows 98 version installed, followed by an installation of Windows XP (update process) on the <strong>19/08/2004 at 17:35:37</strong> time</p>



<figure class="wp-block-image size-large is-resized"><img decoding="async" src="https://www.forensicxs.com/wp-content/uploads/2020/10/Capture-12-1024x320.png" alt="" class="wp-image-858" width="813" height="254" srcset="https://www.forensicxs.com/wp-content/uploads/2020/10/Capture-12-1024x320.png 1024w, https://www.forensicxs.com/wp-content/uploads/2020/10/Capture-12-300x94.png 300w, https://www.forensicxs.com/wp-content/uploads/2020/10/Capture-12-768x240.png 768w, https://www.forensicxs.com/wp-content/uploads/2020/10/Capture-12-1536x481.png 1536w, https://www.forensicxs.com/wp-content/uploads/2020/10/Capture-12.png 1723w" sizes="(max-width: 767px) 89vw, (max-width: 1000px) 54vw, (max-width: 1071px) 543px, 580px" /></figure>



<p><strong>4. <span class="has-inline-color has-luminous-vivid-orange-color">What is the timezone settings ?</span></strong></p>



<p>Using Autopsy, we can navigate through the registry. It can be found in Windows\System32\Config folder. In this directory, we can navigate through the files in the top right hand window of Autopsy, which lets the registry informations unfold in the bottom right hand window. Here we go !</p>



<p>First, we have a system registry key set to &#8220;Central Standard Time&#8221; zone, in system\ControlSet001\Control\TimeZoneInformation :</p>



<figure class="wp-block-image size-large"><img decoding="async" width="1024" height="522" src="https://www.forensicxs.com/wp-content/uploads/2020/10/Capture-13-1024x522.png" alt="" class="wp-image-860" srcset="https://www.forensicxs.com/wp-content/uploads/2020/10/Capture-13-1024x522.png 1024w, https://www.forensicxs.com/wp-content/uploads/2020/10/Capture-13-300x153.png 300w, https://www.forensicxs.com/wp-content/uploads/2020/10/Capture-13-768x391.png 768w, https://www.forensicxs.com/wp-content/uploads/2020/10/Capture-13-1536x783.png 1536w, https://www.forensicxs.com/wp-content/uploads/2020/10/Capture-13.png 1674w" sizes="(max-width: 767px) 89vw, (max-width: 1000px) 54vw, (max-width: 1071px) 543px, 580px" /></figure>



<p>Second, we have another important registry key in software\Microsoft\Windows NT\CurrentVersion\Time Zones, which contains the exact time zone : <strong>GMT &#8211; 06:00</strong></p>



<figure class="wp-block-image size-large is-resized"><img decoding="async" src="https://www.forensicxs.com/wp-content/uploads/2020/10/Capture-14-1024x479.png" alt="" class="wp-image-861" width="786" height="367" srcset="https://www.forensicxs.com/wp-content/uploads/2020/10/Capture-14-1024x479.png 1024w, https://www.forensicxs.com/wp-content/uploads/2020/10/Capture-14-300x140.png 300w, https://www.forensicxs.com/wp-content/uploads/2020/10/Capture-14-768x359.png 768w, https://www.forensicxs.com/wp-content/uploads/2020/10/Capture-14-1536x719.png 1536w, https://www.forensicxs.com/wp-content/uploads/2020/10/Capture-14.png 1682w" sizes="(max-width: 767px) 89vw, (max-width: 1000px) 54vw, (max-width: 1071px) 543px, 580px" /></figure>



<p><strong>5. <span class="has-inline-color has-luminous-vivid-orange-color">Who is the registered owner ?</span></strong></p>



<p>In software\Microsoft\Windows NT\CurrentVersion, we find that the registered owner is <strong>Greg Schardt</strong></p>



<figure class="wp-block-image size-large"><img decoding="async" width="877" height="412" src="https://www.forensicxs.com/wp-content/uploads/2020/10/Capture-15.png" alt="" class="wp-image-863" srcset="https://www.forensicxs.com/wp-content/uploads/2020/10/Capture-15.png 877w, https://www.forensicxs.com/wp-content/uploads/2020/10/Capture-15-300x141.png 300w, https://www.forensicxs.com/wp-content/uploads/2020/10/Capture-15-768x361.png 768w" sizes="(max-width: 767px) 89vw, (max-width: 1000px) 54vw, (max-width: 1071px) 543px, 580px" /></figure>



<p><strong>6. <span class="has-inline-color has-luminous-vivid-orange-color">What is the computer account name ?</span></strong></p>



<p>It can be found in Documents and Settings : <strong>Mr. Evil</strong></p>



<figure class="wp-block-image size-large"><img decoding="async" width="531" height="255" src="https://www.forensicxs.com/wp-content/uploads/2020/10/Capture-16.png" alt="" class="wp-image-865" srcset="https://www.forensicxs.com/wp-content/uploads/2020/10/Capture-16.png 531w, https://www.forensicxs.com/wp-content/uploads/2020/10/Capture-16-300x144.png 300w" sizes="(max-width: 531px) 100vw, 531px" /></figure>



<p>or, it can be found also in the registry, in the SAM file</p>



<figure class="wp-block-image size-large"><img decoding="async" width="888" height="936" src="https://www.forensicxs.com/wp-content/uploads/2020/10/Capture-17.png" alt="" class="wp-image-866" srcset="https://www.forensicxs.com/wp-content/uploads/2020/10/Capture-17.png 888w, https://www.forensicxs.com/wp-content/uploads/2020/10/Capture-17-285x300.png 285w, https://www.forensicxs.com/wp-content/uploads/2020/10/Capture-17-768x810.png 768w" sizes="(max-width: 767px) 89vw, (max-width: 1000px) 54vw, (max-width: 1071px) 543px, 580px" /></figure>



<p><strong>7. <span class="has-inline-color has-luminous-vivid-orange-color">What is the primary domain name ?</span></strong></p>



<p>It is <strong>N-1A9ODN6ZXK4LQ</strong>, which can be found in software\Microsoft\Windows NT\CurrentVersion\Winlogon</p>



<figure class="wp-block-image size-large"><img decoding="async" width="895" height="774" src="https://www.forensicxs.com/wp-content/uploads/2020/10/Capture-18.png" alt="" class="wp-image-867" srcset="https://www.forensicxs.com/wp-content/uploads/2020/10/Capture-18.png 895w, https://www.forensicxs.com/wp-content/uploads/2020/10/Capture-18-300x259.png 300w, https://www.forensicxs.com/wp-content/uploads/2020/10/Capture-18-768x664.png 768w" sizes="(max-width: 767px) 89vw, (max-width: 1000px) 54vw, (max-width: 1071px) 543px, 580px" /></figure>



<p><strong>8. <span class="has-inline-color has-luminous-vivid-orange-color">When was the last recorded computer shutdown date/time ?</span></strong></p>



<p>To find this, we go to the below registry key : s<em>oftware\Microsoft\WindowNT\CurrentVersion\Prefetcher\ExitTime</em></p>



<p>We find a shutdown date/time of <strong>27/08/2004–10:46:27</strong></p>



<figure class="wp-block-image size-large"><img decoding="async" width="558" height="352" src="https://www.forensicxs.com/wp-content/uploads/2020/10/Capture-19.png" alt="" class="wp-image-868" srcset="https://www.forensicxs.com/wp-content/uploads/2020/10/Capture-19.png 558w, https://www.forensicxs.com/wp-content/uploads/2020/10/Capture-19-300x189.png 300w" sizes="(max-width: 558px) 100vw, 558px" /></figure>



<p><strong>9. <span class="has-inline-color has-luminous-vivid-orange-color">How many accounts are recorded (total number) ?</span></strong></p>



<p>In question 6, we had found already the 5 user names : <strong>Administrator, Guest, HelpAssistant, Mr. Evil, SUPPORT_388945a0</strong></p>



<p><strong>10. <span class="has-inline-color has-luminous-vivid-orange-color">What is the account name of the user who mostly uses the computer ?</span></strong></p>



<p><strong>Mr. Evil</strong> is the only real user of this computer, as can be seen in Operating System User Account (1)</p>



<p><strong>11. <span class="has-inline-color has-luminous-vivid-orange-color">Who was the last user to logon to the computer ?</span></strong></p>



<p>The name of the last user who logged on successfully appears in the key DefaultUserName in software\Microsoft\Windows NT\CurrentVersion\Winlogon : it&#8217;s <strong>Mr. Evil</strong> !</p>



<figure class="wp-block-image size-large"><img decoding="async" width="1011" height="399" src="https://www.forensicxs.com/wp-content/uploads/2020/10/Capture-20.png" alt="" class="wp-image-872" srcset="https://www.forensicxs.com/wp-content/uploads/2020/10/Capture-20.png 1011w, https://www.forensicxs.com/wp-content/uploads/2020/10/Capture-20-300x118.png 300w, https://www.forensicxs.com/wp-content/uploads/2020/10/Capture-20-768x303.png 768w" sizes="(max-width: 767px) 89vw, (max-width: 1000px) 54vw, (max-width: 1071px) 543px, 580px" /></figure>



<p><strong>12. <span class="has-inline-color has-luminous-vivid-orange-color">A search for the name of “Greg Schardt” reveals multiple hits. One of these proves that Greg Schardt is Mr. Evil and is also the administrator of this computer. What file is it? What software program does this file relate to ?</span></strong></p>



<p>We have seen that Greg Schardt is the registered owner of the device, while Mr. Evil is the only user of the system. We therefore can believe this is the same person</p>



<p>The search for the name Greg Schardt brings us to this result :</p>



<figure class="wp-block-image size-large"><img decoding="async" width="1024" height="761" src="https://www.forensicxs.com/wp-content/uploads/2020/10/Capture-21-1024x761.png" alt="" class="wp-image-874" srcset="https://www.forensicxs.com/wp-content/uploads/2020/10/Capture-21-1024x761.png 1024w, https://www.forensicxs.com/wp-content/uploads/2020/10/Capture-21-300x223.png 300w, https://www.forensicxs.com/wp-content/uploads/2020/10/Capture-21-768x571.png 768w, https://www.forensicxs.com/wp-content/uploads/2020/10/Capture-21.png 1064w" sizes="(max-width: 767px) 89vw, (max-width: 1000px) 54vw, (max-width: 1071px) 543px, 580px" /></figure>



<p>We can see, in Program Files, a program called Look@LAN. It&#8217;s a portable application that allows a user to monitor which clients are connected to a local network (LAN = Local Area Network) : <a rel="noreferrer noopener" href="https://www.majorgeeks.com/files/details/looklan.html" target="_blank">https://www.majorgeeks.com/files/details/looklan.html</a></p>



<p><strong>The Program Files Look@LANirunin.ini ties us to Mr. Evil as a LAN user, which proves us the link with Greg Schardt !</strong></p>



<figure class="wp-block-image size-large"><img decoding="async" width="886" height="677" src="https://www.forensicxs.com/wp-content/uploads/2020/10/Capture-22.png" alt="" class="wp-image-875" srcset="https://www.forensicxs.com/wp-content/uploads/2020/10/Capture-22.png 886w, https://www.forensicxs.com/wp-content/uploads/2020/10/Capture-22-300x229.png 300w, https://www.forensicxs.com/wp-content/uploads/2020/10/Capture-22-768x587.png 768w" sizes="(max-width: 767px) 89vw, (max-width: 1000px) 54vw, (max-width: 1071px) 543px, 580px" /></figure>



<p><strong>13.  <span class="has-inline-color has-luminous-vivid-orange-color">List the network cards used by this computer</span></strong></p>



<p>There are 2 network cards in use in software\Microsoft\Windows NT\CurrentVersion\NetworkCards :</p>



<p><strong>Compaq WL110 Wireless LAN PC Card</strong></p>



<figure class="wp-block-image size-large is-resized"><img decoding="async" src="https://www.forensicxs.com/wp-content/uploads/2020/10/Capture-23.png" alt="" class="wp-image-879" width="360" height="244" srcset="https://www.forensicxs.com/wp-content/uploads/2020/10/Capture-23.png 909w, https://www.forensicxs.com/wp-content/uploads/2020/10/Capture-23-300x204.png 300w, https://www.forensicxs.com/wp-content/uploads/2020/10/Capture-23-768x521.png 768w" sizes="(max-width: 360px) 100vw, 360px" /></figure>



<p><strong>Xircom CardBus Ethernet 100 + Modem 56 (Ethernet Interface)</strong></p>



<figure class="wp-block-image size-large is-resized"><img decoding="async" src="https://www.forensicxs.com/wp-content/uploads/2020/10/Capture-24-1024x618.png" alt="" class="wp-image-880" width="361" height="217" srcset="https://www.forensicxs.com/wp-content/uploads/2020/10/Capture-24-1024x618.png 1024w, https://www.forensicxs.com/wp-content/uploads/2020/10/Capture-24-300x181.png 300w, https://www.forensicxs.com/wp-content/uploads/2020/10/Capture-24-768x463.png 768w, https://www.forensicxs.com/wp-content/uploads/2020/10/Capture-24.png 1106w" sizes="(max-width: 361px) 100vw, 361px" /></figure>



<p><strong>14. <span class="has-inline-color has-luminous-vivid-orange-color">This same file reports the IP address and MAC address of the computer. What are they ?</span></strong></p>



<p>The question is not immediately clear, but you get the idea when considering the software Look@LAN monitors the clients connected to the local network. To search again for the file we already opened in question 12, just type in the top right search bar, the file name irinin.ini</p>



<p>Inside this file, you will easily find the following :</p>



<p>%LANIP%=<strong>192.168.1.111</strong> -&gt; usually this IP identifies a PC on a local network (so it makes sense to find this IP !)</p>



<p>%LANNIC%=<strong>0010a4933e09</strong> -&gt; a simple MAC adress lookup tool such as <a href="https://rst.im/oui/" target="_blank" rel="noreferrer noopener">https://rst.im/oui/</a>, will confirm this is a Xircom adress. It makes sense with question 13 !</p>



<p><strong>15. <span class="has-inline-color has-luminous-vivid-orange-color">An internet search for vendor name/model of NIC cards by MAC address can be used to find out which network interface was used. In the above answer, the first 3 hex characters of the MAC address report the vendor of the card. Which NIC card was used during the installation and set-up for LOOK@LAN ?</span></strong></p>



<p>The configuration file of LOOK@LAN is irunin.ini. Let&#8217;s open again this file. We find the below informations inside this file :</p>



<figure class="wp-block-image size-large is-resized"><img decoding="async" src="https://www.forensicxs.com/wp-content/uploads/2020/10/Capture-25.png" alt="" class="wp-image-884" width="386" height="235" srcset="https://www.forensicxs.com/wp-content/uploads/2020/10/Capture-25.png 523w, https://www.forensicxs.com/wp-content/uploads/2020/10/Capture-25-300x182.png 300w" sizes="(max-width: 386px) 100vw, 386px" /></figure>



<p>So, it&#8217;s clear that the NIC &#8211; Network Interface Card used during the installation and setup, is the card with the MAC adresss 0010a4933e09, that is the <strong>Xircom CardBus Ethernet 100 + Modem 56 (Ethernet Interface)</strong></p>



<p><strong>16. <span class="has-inline-color has-luminous-vivid-orange-color">Find 6 installed programs that may be used for hacking</span></strong></p>



<p>Looking into the Program Files, it&#8217;s pretty easy to find the following programs :</p>



<p><strong>123WASP</strong> : <a href="https://www.techspot.com/downloads/107-123-write-all-stored-passwords.html" target="_blank" rel="noreferrer noopener">https://www.techspot.com/downloads/107-123-write-all-stored-passwords.html</a></p>



<p><strong>Anonymizer</strong> : <a href="https://news.hitb.org/content/anonymizer-launches-free-anonymizer-privacy-tool-ms-ie-browser" target="_blank" rel="noreferrer noopener">https://news.hitb.org/content/anonymizer-launches-free-anonymizer-privacy-tool-ms-ie-browser</a></p>



<p><strong>Cain</strong> : <a href="https://myhackingworld.com/cain-and-abel/" target="_blank" rel="noreferrer noopener">https://myhackingworld.com/cain-and-abel/</a></p>



<p><strong>Ethereal</strong> : <a href="https://hackersonlineclub.com/what-is-ethereal-hacking/" target="_blank" rel="noreferrer noopener">https://hackersonlineclub.com/what-is-ethereal-hacking/</a></p>



<p>(NB : since that time, it has been renamed into Wireshark, the famous network packet sniffing tool <a href="https://www.wireshark.org/download.html" target="_blank" rel="noreferrer noopener">https://www.wireshark.org/download.html</a>)</p>



<p><strong>Look@LAN</strong> : <a href="https://www.techspot.com/community/topics/look-lan.64758/" target="_blank" rel="noreferrer noopener">https://www.techspot.com/community/topics/look-lan.64758/</a></p>



<p><strong>NetStumbler</strong> : <a href="https://dudehackingtricks.wordpress.com/2014/08/14/netstumbler-hack-wifi-password/" target="_blank" rel="noreferrer noopener">https://dudehackingtricks.wordpress.com/2014/08/14/netstumbler-hack-wifi-password/</a></p>



<p><strong>17. <span class="has-inline-color has-luminous-vivid-orange-color">What is the SMTP email address for Mr. Evil ?</span></strong></p>



<p>To find this information, you could look into the AGENT.INI file. See more about this file in previous versions of Windows :</p>



<p><a href="https://groups.google.com/forum/#!topic/alt.usenet.offline-reader.forte-agent/23uh0mRbq88" target="_blank" rel="noreferrer noopener">https://groups.google.com/forum/#!topic/alt.usenet.offline-reader.forte-agent/23uh0mRbq88</a></p>



<p>The file is located in Program Files\Agent\Data\AGENT.INI</p>



<p>We find the email adress of Mr. Evil : <strong>whoknowsme@sbcglobal.net</strong></p>



<p><strong>18. <span class="has-inline-color has-luminous-vivid-orange-color">What are the NNTP (news server) settings for Mr. Evil ?</span></strong></p>



<p>NNTP stands for Network News Transfer Protocol (Newsgroup / Usenet) : <a href="https://ccnatutorials.in/application-layer-of-tcp-ip/nntp-network-news-transfer-protocol/" target="_blank" rel="noreferrer noopener">https://ccnatutorials.in/application-layer-of-tcp-ip/nntp-network-news-transfer-protocol/</a></p>



<p>Again, a search in the AGENT.INI file will let you find the information</p>



<figure class="wp-block-image size-large is-resized"><img decoding="async" src="https://www.forensicxs.com/wp-content/uploads/2020/10/Capture-26.png" alt="" class="wp-image-889" width="346" height="63" srcset="https://www.forensicxs.com/wp-content/uploads/2020/10/Capture-26.png 390w, https://www.forensicxs.com/wp-content/uploads/2020/10/Capture-26-300x55.png 300w" sizes="(max-width: 346px) 100vw, 346px" /></figure>



<p><strong>19. <span class="has-inline-color has-luminous-vivid-orange-color">What two installed programs show this information ?</span></strong></p>



<p>We need to look for mail client and/or Usenet client. One source to look into this is NTUSER.DAT, which is a well known Forensic source</p>



<p>We find that <strong>MS Outlook Express</strong> reveals the email adress of Mr. Evil. To find this, you need to look into NTUSER.DAT\Software\Microsoft\Windows\CurrentVersion\UnreadMail</p>



<p>Just type in NTUSER.DAT in the search bar, and navigate in the file structure</p>



<figure class="wp-block-image size-large"><img decoding="async" width="832" height="913" src="https://www.forensicxs.com/wp-content/uploads/2020/10/Capture-29.png" alt="" class="wp-image-893" srcset="https://www.forensicxs.com/wp-content/uploads/2020/10/Capture-29.png 832w, https://www.forensicxs.com/wp-content/uploads/2020/10/Capture-29-273x300.png 273w, https://www.forensicxs.com/wp-content/uploads/2020/10/Capture-29-768x843.png 768w" sizes="(max-width: 767px) 89vw, (max-width: 1000px) 54vw, (max-width: 1071px) 543px, 580px" /></figure>



<p>At this moment, I&#8217;m not able to find the second program revealing the same information&#8230;if you find it, please put it in the comment section !</p>



<p><strong>20. <span class="has-inline-color has-luminous-vivid-orange-color">List 5 newsgroups that Mr. Evil has subscribed to ?</span></strong></p>



<p>There is a good article to understand Outlook Express forensics : <a href="https://www.mailxaminer.com/blog/outlook-express-email-forensics/" target="_blank" rel="noreferrer noopener">https://www.mailxaminer.com/blog/outlook-express-email-forensics/</a></p>



<p>All the Outlook Express email folders and messages, local IMAP folders and settings are stored in one folder. The location of this directory is :</p>



<p>Documents and Settings\user_name\Local Settings\Application Data\Identities\Microsoft\Outlook Express</p>



<p>We find <strong>many newsgroup to which Mr. Evil has suscribed</strong> !</p>



<figure class="wp-block-image size-large"><img decoding="async" width="882" height="622" src="https://www.forensicxs.com/wp-content/uploads/2020/10/Capture-30.png" alt="" class="wp-image-896" srcset="https://www.forensicxs.com/wp-content/uploads/2020/10/Capture-30.png 882w, https://www.forensicxs.com/wp-content/uploads/2020/10/Capture-30-300x212.png 300w, https://www.forensicxs.com/wp-content/uploads/2020/10/Capture-30-768x542.png 768w" sizes="(max-width: 767px) 89vw, (max-width: 1000px) 54vw, (max-width: 1071px) 543px, 580px" /></figure>



<p><strong>21. <span class="has-inline-color has-luminous-vivid-orange-color">A popular IRC (Internet Relay Chat) program called MIRC was installed. What are<br>the user settings that was shown when the user was online and in a chat channel ?</span></strong></p>



<p>The mIRC program (<a href="https://www.mirc.com/" target="_blank" rel="noreferrer noopener">https://www.mirc.com/</a>) can be found in the Program Files</p>



<p>Just open and check through the mirc.ini and you will get the requested information</p>



<p><strong>user=Mini Me<br>email=none@of.ya<br>nick=Mr<br>anick=mrevilrulez</strong></p>



<figure class="wp-block-image size-large is-resized"><img decoding="async" src="https://www.forensicxs.com/wp-content/uploads/2020/10/Capture-31-1024x355.png" alt="" class="wp-image-899" width="738" height="255" srcset="https://www.forensicxs.com/wp-content/uploads/2020/10/Capture-31-1024x355.png 1024w, https://www.forensicxs.com/wp-content/uploads/2020/10/Capture-31-300x104.png 300w, https://www.forensicxs.com/wp-content/uploads/2020/10/Capture-31-768x266.png 768w, https://www.forensicxs.com/wp-content/uploads/2020/10/Capture-31.png 1432w" sizes="(max-width: 738px) 100vw, 738px" /></figure>



<p><strong>22. <span class="has-inline-color has-luminous-vivid-orange-color">This IRC program has the capability to log chat sessions. List 3 IRC channels that the<br>user of this computer accessed</span></strong></p>



<p>The log section if mIRC in the Program Files section, reveals their is a &#8220;logs&#8221; directory. The chat sessions immediately appear here</p>



<figure class="wp-block-image size-large"><img decoding="async" width="794" height="505" src="https://www.forensicxs.com/wp-content/uploads/2020/10/Capture-32.png" alt="" class="wp-image-900" srcset="https://www.forensicxs.com/wp-content/uploads/2020/10/Capture-32.png 794w, https://www.forensicxs.com/wp-content/uploads/2020/10/Capture-32-300x191.png 300w, https://www.forensicxs.com/wp-content/uploads/2020/10/Capture-32-768x488.png 768w" sizes="(max-width: 767px) 89vw, (max-width: 1000px) 54vw, (max-width: 1071px) 543px, 580px" /></figure>



<p><strong>23. <span class="has-inline-color has-luminous-vivid-orange-color">Ethereal, a popular “sniffing” program that can be used to intercept wired and<br>wireless internet packets was also found to be installed. When TCP packets are collected<br>and re-assembled, the default save directory is that users \My Documents directory. What is the name of the file that contains the intercepted data ?</span></strong></p>



<p>Searching into the Ethereal directory, we find a &#8220;recent&#8221; file. Open this file reveals the requested information &#8220;<strong>interception</strong>&#8220;</p>



<figure class="wp-block-image size-large is-resized"><img decoding="async" src="https://www.forensicxs.com/wp-content/uploads/2020/10/Capture-33-1024x521.png" alt="" class="wp-image-903" width="750" height="381" srcset="https://www.forensicxs.com/wp-content/uploads/2020/10/Capture-33-1024x521.png 1024w, https://www.forensicxs.com/wp-content/uploads/2020/10/Capture-33-300x153.png 300w, https://www.forensicxs.com/wp-content/uploads/2020/10/Capture-33-768x391.png 768w, https://www.forensicxs.com/wp-content/uploads/2020/10/Capture-33-1536x781.png 1536w, https://www.forensicxs.com/wp-content/uploads/2020/10/Capture-33.png 1801w" sizes="(max-width: 706px) 89vw, (max-width: 767px) 82vw, 740px" /></figure>



<p><strong>24. <span class="has-inline-color has-luminous-vivid-orange-color">Viewing the file in a text format reveals much information about who and what was<br>intercepted. What type of wireless computer was the victim (person who had his internet<br>surfing recorded) using ?</span></strong></p>



<p>The interception file can be found typing &#8220;interception&#8221; in the search bar on the top right of the home screen</p>



<figure class="wp-block-image size-large"><img decoding="async" width="1024" height="787" src="https://www.forensicxs.com/wp-content/uploads/2020/10/Capture-34-1024x787.png" alt="" class="wp-image-904" srcset="https://www.forensicxs.com/wp-content/uploads/2020/10/Capture-34-1024x787.png 1024w, https://www.forensicxs.com/wp-content/uploads/2020/10/Capture-34-300x230.png 300w, https://www.forensicxs.com/wp-content/uploads/2020/10/Capture-34-768x590.png 768w, https://www.forensicxs.com/wp-content/uploads/2020/10/Capture-34.png 1074w" sizes="(max-width: 767px) 89vw, (max-width: 1000px) 54vw, (max-width: 1071px) 543px, 580px" /></figure>



<p>The user agent is a <strong>Microsoft Internet Explorer 4.01 using a Pocket PC with Windows CE</strong>, screen resolution 240&#215;320. I told you, it&#8217;s vintage !</p>



<figure class="wp-block-image size-large"><img decoding="async" width="295" height="465" src="https://www.forensicxs.com/wp-content/uploads/2020/10/ppcscreen.jpg" alt="" class="wp-image-905" srcset="https://www.forensicxs.com/wp-content/uploads/2020/10/ppcscreen.jpg 295w, https://www.forensicxs.com/wp-content/uploads/2020/10/ppcscreen-190x300.jpg 190w" sizes="(max-width: 295px) 100vw, 295px" /></figure>



<p><strong>25. <span class="has-inline-color has-luminous-vivid-orange-color">What websites was the victim accessing ?</span></strong></p>



<p>The victim was accessing <strong>mobile.msn.com</strong>, as can be seen in the interception file. We can see down below that the victim was also using MSN hotmail (email)</p>



<figure class="wp-block-image size-large"><img decoding="async" width="750" height="74" src="https://www.forensicxs.com/wp-content/uploads/2020/10/Capture-35.png" alt="" class="wp-image-907" srcset="https://www.forensicxs.com/wp-content/uploads/2020/10/Capture-35.png 750w, https://www.forensicxs.com/wp-content/uploads/2020/10/Capture-35-300x30.png 300w" sizes="(max-width: 706px) 89vw, (max-width: 767px) 82vw, 740px" /></figure>



<p><strong>26. <span class="has-inline-color has-luminous-vivid-orange-color">Search for the main users web based email address. What is it ?</span></strong></p>



<p>In the Extracted content web history, you can find many historical browsing files. Searching through these files, you can see some instances were the user had to login. It reveals the email adress <strong>mrevilrulez@yahoo.com</strong> (we already found this name in question 21)</p>



<figure class="wp-block-image size-large is-resized"><img decoding="async" src="https://www.forensicxs.com/wp-content/uploads/2020/10/Capture-36-1024x485.png" alt="" class="wp-image-908" width="730" height="346" srcset="https://www.forensicxs.com/wp-content/uploads/2020/10/Capture-36-1024x485.png 1024w, https://www.forensicxs.com/wp-content/uploads/2020/10/Capture-36-300x142.png 300w, https://www.forensicxs.com/wp-content/uploads/2020/10/Capture-36-768x363.png 768w, https://www.forensicxs.com/wp-content/uploads/2020/10/Capture-36-1536x727.png 1536w, https://www.forensicxs.com/wp-content/uploads/2020/10/Capture-36.png 1678w" sizes="(max-width: 730px) 100vw, 730px" /></figure>



<p><strong>27. <span class="has-inline-color has-luminous-vivid-orange-color">Yahoo mail, a popular web based email service, saves copies of the email under what<br>file name ?</span></strong></p>



<p>The Yahoo emails are stored under &#8220;<strong>ShowLetter[1]</strong>&#8220;</p>



<p>We can confirm the email adress used by Mr. Evil</p>



<figure class="wp-block-image size-large is-resized"><img decoding="async" src="https://www.forensicxs.com/wp-content/uploads/2020/10/Capture-37-1024x609.png" alt="" class="wp-image-909" width="755" height="448" srcset="https://www.forensicxs.com/wp-content/uploads/2020/10/Capture-37-1024x609.png 1024w, https://www.forensicxs.com/wp-content/uploads/2020/10/Capture-37-300x178.png 300w, https://www.forensicxs.com/wp-content/uploads/2020/10/Capture-37-768x456.png 768w, https://www.forensicxs.com/wp-content/uploads/2020/10/Capture-37.png 1531w" sizes="(max-width: 706px) 89vw, (max-width: 767px) 82vw, 740px" /></figure>



<p><strong>28. <span class="has-inline-color has-luminous-vivid-orange-color">How many executable files are in the recycle bin ?</span></strong></p>



<p>There are <strong>4 executables</strong> in the recycle bin</p>



<figure class="wp-block-image size-large"><img decoding="async" width="1024" height="420" src="https://www.forensicxs.com/wp-content/uploads/2020/10/Capture-38-1024x420.png" alt="" class="wp-image-910" srcset="https://www.forensicxs.com/wp-content/uploads/2020/10/Capture-38-1024x420.png 1024w, https://www.forensicxs.com/wp-content/uploads/2020/10/Capture-38-300x123.png 300w, https://www.forensicxs.com/wp-content/uploads/2020/10/Capture-38-768x315.png 768w, https://www.forensicxs.com/wp-content/uploads/2020/10/Capture-38.png 1097w" sizes="(max-width: 767px) 89vw, (max-width: 1000px) 54vw, (max-width: 1071px) 543px, 580px" /></figure>



<p><strong>29. <span class="has-inline-color has-luminous-vivid-orange-color">Are these files really deleted ?</span></strong></p>



<p><strong>No</strong>, they are just moved to the recycle bin and not deleted&#8230;!</p>



<p><strong>30. <span class="has-inline-color has-luminous-vivid-orange-color">How many files are actually reported to be deleted by the file system ?</span></strong></p>



<p>It is pretty easy. Just browse to &#8220;View&#8221; and you will find the counter &#8220;All&#8221; -&gt; <strong>1 371 files were deleted</strong>. Thanks to &#8220;bobo&#8221; for the tip !</p>



<figure class="wp-block-image size-large"><img decoding="async" width="277" height="114" src="https://www.forensicxs.com/wp-content/uploads/2020/11/image-27.png" alt="" class="wp-image-1024"/></figure>



<p><strong>31. <span class="has-inline-color has-luminous-vivid-orange-color">Perform an Anti-Virus check. Are there any viruses on the computer ?</span></strong></p>



<p>Yes, there is a zip bomb present, <strong>unix_hack.tgz</strong></p>



<p>It&#8217;s found in the &#8220;Interesting Items&#8221; section</p>



<figure class="wp-block-image size-large"><img decoding="async" width="277" height="75" src="https://www.forensicxs.com/wp-content/uploads/2020/10/Capture-39.png" alt="" class="wp-image-912"/></figure>



<p>This is what Wikipedia says about zip bombs </p>



<figure class="wp-block-image size-large is-resized"><img decoding="async" src="https://www.forensicxs.com/wp-content/uploads/2020/10/Capture-40.png" alt="" class="wp-image-913" width="549" height="226" srcset="https://www.forensicxs.com/wp-content/uploads/2020/10/Capture-40.png 772w, https://www.forensicxs.com/wp-content/uploads/2020/10/Capture-40-300x124.png 300w, https://www.forensicxs.com/wp-content/uploads/2020/10/Capture-40-768x316.png 768w" sizes="(max-width: 549px) 100vw, 549px" /></figure>



<p>Here is an example of a famous zip bomb (try with caution !) : <a href="https://www.unforgettable.dk/" target="_blank" rel="noreferrer noopener">https://www.unforgettable.dk/</a></p>



<p><span class="has-inline-color has-luminous-vivid-orange-color"><strong>Conclusion</strong> </span>: </p>



<p>After this writeup, it is clear now that Greg Schardt and Mr. Evil are just one single person. The seized laptop is including hacking software that was used to sniff data from victims, chat on hackers newsgroup and IRC, contain a zip bomb. So, all suspicions about Greg Schardt were true !</p>



<p>One can only be amazed by the power of forensic tools such as Autopsy. It&#8217;s quite amazing all the data stored in your PC, that can be recovered by someone knowing were to look at. Be carefull with your data ! Don&#8217;t think you can hide on Internet !</p>



<p><span class="has-inline-color has-luminous-vivid-orange-color"><strong>Additional note</strong> </span>: </p>



<p>I would like to share an excellent ressource I found from the DFIR &#8211; Digital Forensics and Incident Response (SANS training and certification institute). It helped me a lot to walk through this challenge. You can download an excellent PDF on this page : <a rel="noreferrer noopener" href="https://www.sans.org/security-resources/posters/windows-forensic-analysis/170/download" target="_blank">https://www.sans.org/security-resources/posters/windows-forensic-analysis/170/download</a></p>



<p>See below an example of the sections you find in this PDF. It&#8217;s a very helpfull checklist !</p>



<figure class="wp-block-image size-large is-resized"><img decoding="async" src="https://www.forensicxs.com/wp-content/uploads/2020/10/Capture-28-1024x648.png" alt="" class="wp-image-891" width="800" height="506" srcset="https://www.forensicxs.com/wp-content/uploads/2020/10/Capture-28-1024x648.png 1024w, https://www.forensicxs.com/wp-content/uploads/2020/10/Capture-28-300x190.png 300w, https://www.forensicxs.com/wp-content/uploads/2020/10/Capture-28-768x486.png 768w, https://www.forensicxs.com/wp-content/uploads/2020/10/Capture-28.png 1265w" sizes="(max-width: 767px) 89vw, (max-width: 1000px) 54vw, (max-width: 1071px) 543px, 580px" /></figure>



<p></p>
]]></content:encoded>
					
					<wfw:commentRss>https://www.forensicxs.com/computer-forensics-hacking-case-using-autopsy/feed/</wfw:commentRss>
			<slash:comments>7</slash:comments>
		
		
			</item>
	</channel>
</rss>

<!--
Performance optimized by W3 Total Cache. Learn more: https://www.boldgrid.com/w3-total-cache/?utm_source=w3tc&utm_medium=footer_comment&utm_campaign=free_plugin

Page Caching using Disk: Enhanced 
Database Caching 1/50 queries in 0.053 seconds using Disk

Served from: www.forensicxs.com @ 2025-12-29 05:58:18 by W3 Total Cache
-->