In-Class #10

advertisement
BACS371
Steganography
BACS 371 – Introduction to Computer Forensics
Homework Lab Activity (2 per group)
Name: ____________________________
Name: ________________________________
You have been contacted by Homeland Security to help uncover evidence for a pending case. You
were selected because it was known that you have training in Computer Forensics and they want to
hire you to perform professional services. The case involves a flash drive acquired by legal search and
seizure from a suspected international criminal. At the time of his apprehension, the suspect had just
completed deleting files from the flash drive. It is not known what was deleted. You have been given
an image of the flash drive to analyze (steganography-case.E01). Initial review of the image indicated
that there are 3 primary data sub-directories. Two have photographs and the 3rd has a bitmap and a
short video. The photographs are the main focus of this investigation because the suspect was heard
muttering to himself that, “you’ll never find what’s hidden in those pictures” during his booking. In
addition, the search of his home revealed several books and articles on steganography. Because of
this, the authorities believe that there may be usable evidence hidden on the flash drive. Your task is
to use whatever tools you deem necessary to collect evidence that may still reside on the image.
As part of your investigation, answer the following questions about the steganography-case.E01
image. Note, you are responsible for deciding which tools to use. Choose wisely because some tools
may make your job easier. Make screenshots and print any evidence that you find. Attach these
printouts to this sheet as part of the assignment solution.
Step 0: Initial Image Documentation1
The File format of the steganography-case.E01 image is _______________
How many Volumes are in the steganography-case.E01 image: ___________________
The volume label for the steganography-case.E01 image is _______________
What is the number of the 1st data sector of the volume: _______________
What is the bytes per cluster for the volume: ________________________
How many free clusters are in the volume: _________________
How many usable sectors are in the volume: _________________
How many clusters are in the volume: _______________________
What is the total capacity (in bytes) of the volume: ____________________
Step 1: Cursory Analysis
Answer the following questions about the file partition found on the image.
Within the “For Image” sub-directory, how many sub-directories files were found: ____________
How many deleted files were found in each of these (list by the name of each sub-directory):
_________________________________________________________________________________________
List the name(s) of the deleted files that appear to hold promising evidence:
_________________________________________________________________________________________
_________________________________________________________________________________________
1
Hint: X-Ways Partition tab
BACS 371 – Computer Forensics
Page 1 of 2
BACS371
Steganography
Open these files (in X-Ways, you can use the “preview” tab) and describe any evidence that
provides clues on how to proceed with your analysis:
_____________________________________________________________________________________
_____________________________________________________________________________________
_____________________________________________________________________________________
Step 2: In-Depth Analysis
Follow the clues uncovered in the previous step and answer the following question.
What did you do to follow-up on these clues:
_________________________________________________________________________________________
_________________________________________________________________________________________
_________________________________________________________________________________________
Step 3: Report Summary
To complete the job (so you can be paid), summarize your findings in a Microsoft Word document (not
to exceed 1.5 page). This document should list the names and types of all files containing evidence
that you found. It should also briefly describe the evidence found in each file. Be sure to present your
findings in a professional manner. Print copies of any evidence you find and attach to your solution.
BACS 371 – Computer Forensics
Page 2 of 2
Download