King Saud University College of Computer and Information Sciences Department of Information Technology IT 454 (Computer Forensics) Second Semester – 2014/2015 (1435/1436) Lab #7 Part I: Validating Forensic Data With Hexadecimal Editor A. File Hash Value Generation In this part you will learn how to generate the hash value of a file using Hex workshop and how it woroks. 1. Start Word, and in a new document, type a sentence or two, and save the file as test_hex.doc in your work folder. When you’re finished, exit Word. 2. Start Hex Workshop. Make sure that you use Run as administrator. From Hex Workshop Open the file «test_hex.doc» that you have created in the previous step. 3. To obtain an MD5 hash value of this file, click Tools, select Générâtes Checksum from the menu. 4. In Generate Checksum dialogue box, select MD5 Under Select Algorithmes List box, and then click the Generate buttons to see the MD5 hash value in the results at the lower right pane at checksum result window. 5. Copy the hash value to a new text file (notepad) by Right-clicking on it and select copy. Save the text file as « test_hex_hashvalue.txt » in your work folder. exit Notepad. Close the main pane and leave Hex Workshop running for the next activity. 6. Open and update the word file created in step1 (test_hex.doc), save the modifications, and then repeat the same steps to generate the new hash value file. Compare both MD5 hash values you have created. When you are finished, exit Notepad and Hex Workshop. B. Specific Sector Hash Value Generation In this section you will learn how to generate a hash value for specific part of the file. 1. In Hex Workshop, open the Jeffersonian quotes.doc file from your work folder (2_hash). King Saud University College of Computer and Information Sciences Department of Information Technology IT 454 (Computer Forensics) Second Semester – 2014/2015 (1435/1436) Lab #7 2. Place the mouse pointer at the beginning of the byte address 00000000; the cursor should be positioned on the hexadecimal D0 because you’re examining the first sector of the file. 3. Now drag to select a complete sector 0x1E6 (512 bytes). To know when you have selected the sector, watch the Offset counter at the lower right in the status bar. It should display “Sel: 0x00000200” when you have highlighted the entire sector. 4. Click Tools, Generate Checksum from the menu. 5. In the Select Algorithmes List box, scroll down and click MD5, click to enable the Selection option button (if necessary), and the click Generate. 6. Right-click the hash value in the results pane and click Copy. Start Notepad, and the paste the hash value into a new text document. Save the file as «Quotes_hashvalue.txt » in your work folder, and the exit Notepad and Hex Workshop. Part II: splitted image file validation: In this part you will learn how hash value is useful in validating image splits. Chris Murphy, a Superior Bicycles employee suspected of industrial espionage, had a Windows XP system formatted in NTFS that was seized as part of the investigation. You will use the GCFI-NTFS image files for this project (provided in content folder Chap09 in your folder), which consist of several .zip files. Extract them to your work folder, if necessary. You need at least 9 GB of storage space for these files. 1. In this excersize use the sheet provided to you to compare it with your results later in this project. 2. Start Notepad, and open GCFI-NTFS.pds (included with the GCFI-NTFS image files). Read this document, which tells ProDiscover how to reassemble the image file from the segments. When you’re finished, exit Notepad. 3. In Hex Workshop, open GCFI-NTFS.eve from your work folder. 4. Click Tools, Generate MD5 Checksum for the image file. King Saud University College of Computer and Information Sciences Department of Information Technology IT 454 (Computer Forensics) Second Semester – 2014/2015 (1435/1436) Lab #7 5. When the checksum process is finished, check the MD5 hash value in Hex Workshop’s lower-right pane, and compare it to the one in the document provided to you. 6. Repeat Steps 3 through 5 for each remaining GCFI-NTFS file. 7. After you have verified all the files, make a note in your log listing the files you examined and their hash values, and then exit Hex Workshop. Part III: Data-Hiding Techniques A. Bit Shifting : In this part you will learn how bit shifting technique works. 1. Start Notepad, and in a text document, type: “TEST FILE. Test file is to see how shifting bits will alter the data in a file.” 2. Save the file as Bit_shift.txt in your work folder, and exit Notepad. 3. Start Hex Workshop. Click File, Open from the menu. Navigate to your work folder, and the double-click Bit_shift.txt. 4. To set up Hex Workshop for the bit-shifting exercise, click Options, Toolbars from the menu. 5. In the Customize dialogue box, click the Data Operations check box, and the click OK. 6. Click the Shift Left button (<< icon) on the Data Operations toolbar. The Shift Left Operation dialogue box opens, where you specify how you want to treat the data, the ordering scheme to use for bytes, and whether you shift bits for selected text or the entire file. 7. Click OK to accept the default settings and shift the bits in Bit_shift.txt to the left. 8. Save the file as Bit_shift_left.txt in your work folder. King Saud University College of Computer and Information Sciences Department of Information Technology IT 454 (Computer Forensics) Second Semester – 2014/2015 (1435/1436) Lab #7 9. To return the file to its original configuration, shift the bits back to the right by clicking the Shift Right button (>> icon) on the Data Operations toolbar. Click OK to accept the default settings in the Shift Right Operation dialogue box. The file is displayed in its original format. 10. Save the file as Bit_shift_right.txt in your work folder, and leave Hex Workshop open for the next activity. B. Hiding Data with bit-shifting : In this part you will learn how to use bit shifting in hiding data. 1. With Bit_shift_right.txt open in Hex Workshop, click File, Open to open Bit_shift.txt, and then repeat to open Bit_shift_left.txt. 2. Click the Bit_shift.txt tab in the upper pane to make it the active file. 3. Click Tools, Generates Checksum to generate MD5 hash value of Bit_shift.txt, as shown in the lower-right pane, copy and paste the hash value in a new text document in Notepad. 4. Repeat Steps 2 and 3 for Bit_shift_left.txt and Bit_shift_right.txt, pasting their hash values in the same text file in Notepad. 5. Compare the MD5 hash values to determine whether the files are different. When you are finished, exit Notepad and Hex Workshop. Part IV: (Use S-Tools4- steganography) Hide text in image : In this project, you will use S-Tools4 to create a steganography file for hiding an image. (note : S-Tools4 can be downloaded from www.stegoarchive.com), install the software, and then follow the steps below: 1. In Windows Explorer, navigate to where you install S-Tools4, and start the program by double-clicking S-Tools.exe. 2. Drag Rushmore.bmp from the given folder in the Blog (part 4) to the S-Tools window. King Saud University College of Computer and Information Sciences Department of Information Technology IT 454 (Computer Forensics) Second Semester – 2014/2015 (1435/1436) Lab #7 3. To hide text in the Rushmore.bmp file, drag findme.txt from your work folder to the Rushmore.bmp image. 4. In the Hiding 99 bytes dialog box, type FREEDOM in the Passphrase and Verify passphrase text boxes, and then click OK. A hidden data window opens in the STools window. 5. Right-click the hidden data window and click Save as. Save the image as Steg.bmp in your work folder. 6. Close the Steg.bmp and Rushmore.bmp windows, but leave S-Tools open for the next project. Self-Practice: 1. Start Notepad and type the following in a new text document: “This document contains very sensitive information. We do not want the competition to be able to read it if they intercept the message.” 2. Save the file as correspondence.txt in your work folder, and then exit Notepad. 3. Start Hex Workshop, and open the correspondence.txt file. 4. In lab practice, you used the Shift Left and Shift Right buttons on the Data Operations toolbar. Notice as you move your cursor over the toolbar buttons to the right that Rotate Left, Rotate Right, Block Shift Left, and Block Shift Right are also available. Click the Rotate Right button. As shown in the Operand section of the Rotate Right Operation dialog box, the data can be treated as an 8-, 16-, 32-, or 64-bit unsigned long. Write down which one it is (assuming little endian is the byte ordering), and then click OK. 5. Click the Rotate Left button. In the Rotate Left Operation dialog box, make sure the same setting is listed in the Treat Data As text box as for the Rotate Right operation, and then click OK. The file should return to its original form. In a rotated shift operation, the bits that “fall off” one end of the number as it’s rotated appear on the other end of the number. In this way, no bits are lost, and the process can be reversed to restore the original message. King Saud University College of Computer and Information Sciences Department of Information Technology IT 454 (Computer Forensics) Second Semester – 2014/2015 (1435/1436) Lab #7 6. Save the file. 7. Click the Shift Right button and click OK twice, noting how the data is being treated. Click OK. 8. Finally, click the Block Shift Left button. 9. Attempt to reverse the procedure by doing the following: Click Block Shift Right, click Shift Left twice, and click OK as needed. 10. Notice that the message is garbled. In a normal (nonrotated) shift operation, the bits that fall off one end of the number when it’s rotated are discarded; therefore, the original data is lost or modified. Click File >> Close. When prompted to save, click No. 11. Open the file again in Hex Workshop, and repeat Steps 7 and 8. Save the file as correspondence2.txt in your work folder. If you’re prompted to create a backup, click Yes. 12. Attempt to undo the procedure by working in reverse, as in Step 9. 13. Write a short paper stating whether you think this method is a reliable one for encrypting. Leave Hex Workshop running for the next project.