King Saud University College of Computer and Information Sciences

advertisement
King Saud University
College of Computer and Information Sciences
Department of Information Technology
IT 454 (Computer Forensics)
First Semester – 2013/2014 (1434/1435)
Lab Sheet #4
In this lab session, you will learn:
1. How to acquire and validate image using Access Data FTK Imager.
2. How to calculate and compare the hash value of a file using FTK Imager.
3. How the hash value works
 Part I: Image Validation with Access Data FTK imager
In this part you will learn:
A. Installing Access Data FTK Imager.
B. Acquiring Image of USB Drive & Validating image with hash signature Algorithms
(MD5 SHA1).
A. Installing Access Data FTK Imager:
 Execute the setup file by double-clicking it.
 On the Welcome screen, click Next.
 Read and accept the License Agreement, then click Next.
 Do one of the following:
 Accept the default installation location.
 Browse to a different destination folder.
 Click Next.
 In the Ready to Install screen, click Next.
 Do one of the following:
 Mark the Launch AccessData FTK Imager box to force Imager to run immediately
after the install is complete.
 Leave the box unmarked to run the newly installed program at a later time.
 Click Finish to complete the installation and close the wizard.
King Saud University
College of Computer and Information Sciences
Department of Information Technology
IT 454 (Computer Forensics)
First Semester – 2013/2014 (1434/1435)
B. Acquiring Image of USB Drive :
1- To create a forensic image Click File > Create Disk Image or Click the Create
Disk Image button on the Toolbar.
2- In the Select Source dialog box, select the source you want to make an image of.
(Choose the USB Drive (physical drive)).
3- Click Next.
4- Select the drive or click the drop-down list to choose the source of the image you
want, and then click Finish.
5- In the Create Image dialog, make sure the verify images after they are created
checkbox is checked. This will compare the stored hashes of your image content. If a
file doesn’t have a hash, this option will generate one.
6- Then click Add.
7- Select the type of image you want to create.
 The raw image type is not compressed. If you select the Raw (dd) type, be
sure to have adequate available drive space for the resulting image.
 If you are creating an AFF image type, choose AFF. The Image Destination
Folder dialog box you see will be different than that seen when selecting any
other image type.
8- Choose SMART Click Next.
9- Specify Evidence Item Information. All Evidence Item Information is optional, but it
is helpful to have the information easily accessible in case it is called into question at
any time after creation
10- Complete the fields in the Evidence Item Information dialog.
11- Click Next.
12- In the Image Destination Folder field, do one of the following:
 Type the location path where you want to save the image file.
 Click Browse to find and select the desired location.
Note: If the destination folder you select is on a drive that does not have sufficient free space to
store the entire image file, FTK Imager prompts for a new destination folder when all available
space has been used in the first location. However, all related image files must be saved together
in the same folder prior to being added to a case.
13-
In the Image Filename field, specify a name for the image file but do not specify a file
extension.
King Saud University
College of Computer and Information Sciences
Department of Information Technology
IT 454 (Computer Forensics)
First Semester – 2013/2014 (1434/1435)
14-
15-
16-
17181920-
Specify the Image fragment Size:
 Default Image Fragment Size = 1500 MB
 To save images segments that can be burned to a CD, specify 650 MB.
 To save image segments that can be burned to a DVD, specify 4000 MB.
 The .S01 format is limited by design to sizes between 1 MB and 2047 MB (2
GB). Compressed block pointers are 31-bit numbers (the high bit is a compressed
flag), which limits the size of any one segment to two gigabytes.
Select the compression level to use:
 0=No Compression
 1=Fastest, Least Compression (faster, and also slightly smaller than a 0compression file)
 9=Slowest, Most Compression (smallest file, slowest to create).
 Numbers between 1 and 9 produce an image with varying levels of compression
to speed ratio.
 Choose 1 for the compression level.
To encrypt the image, choose the correct encryption box as explained below:
 To encrypt the new image with AD Encryption, mark the Use AD Encryption
box.
 To encrypt the new image with AFF Encryption, mark the Use AFF Encryption
box.
Click Finish.
If you choose the encrypt option in step 16, Ad Encryption credentials dialog box.
Enter the password.
Click Start to begin the imaging process.
After the images are successfully created, the Drive/Image Verify Results box shows
detailed image information, including MD5 and SHA1 check sums, and bad sectors.
Note: The data displayed in the results box vary, according to the type of image created.
21-




A progress dialog appears showing the following:
The source that is being imaged
The location where the image is being saved
The status of the imaging process
A graphical progress bar
King Saud University
College of Computer and Information Sciences
Department of Information Technology
IT 454 (Computer Forensics)
First Semester – 2013/2014 (1434/1435)




The amount of data in MB that has been copied and the total amount to be copied
Elapsed time since the imaging process began
Estimated time remaining until the process is complete
Image Summary button. Click it to open the Image Summary window
The Image Summary also includes the data you entered in the Evidence Item Information
dialog.
22- Click OK to close the Image Summary.
23- Click OK to return to the Creating Image dialog.
24- Click Close to exit back to Imager.
 PART II: to learn how to calculate and compare the hash value of a file using FTK Imager.
In this part you will create a file on a USB drive and calculate its hash value in FTK Imager.
Then you change the file and calculate the hash value again to compare the files. You need a
Windows computer and a USB drive.
1. Create a folder called C5Prj04 on your USB drive, and then start Notepad.
2. In a new text file, type “This is a test of hash values. One definition of a forensic hash
is that if the file changes, the hash value changes.”
3. Save the file as hash1.txt in the C5Prj04 folder on your USB drive, and then exit
Notepad.
4. Start FTK Imager, and click File, Add Evidence Item from the menu. In the Select
Source dialog box, click the Logical Drive option button, and then click Next.
5. In the Select Drive dialog box, click the Drive Selection list arrow, click to select your
USB drive, and then click Finish.
6. In the upper-left pane, click to expand your USB drive and continue expanding until you
can click the C5Prj04 folder. In the upper-right pane, you should see the hash1.txt file
you created.
7. Right-click on the file and click Export File Hash List. Save the file as original hash in
the C5Prj04 folder on your USB drive. (note: FTK Imager saves it as a .csv file).Exit
FTK Imager, and start Notepad.
8. Open hash1.txt in Notepad. Add one letter to the end of the file, save it, and exit
Notepad.
9. Start FTK Imager again. Repeat Steps 4 to 7 (but without starting Notepad again), but
this time when you export the file hash list, save the file as changed hash.
King Saud University
College of Computer and Information Sciences
Department of Information Technology
IT 454 (Computer Forensics)
First Semester – 2013/2014 (1434/1435)
10. Open the original hash and changed hash files on your USB drive in Excel(or another
spreadsheet program). Compare the hash values in both files to see whether they are
different, and then exit Excel.
 PART III: how the hash value works:
In this project, you create a file on your USB drive and calculate its hash values in FTK Imager.
Then you change the filename and extension and calculate the hash values again to compare
them.
1. Create a folder called C5Prj05 on your USB drive, and then start Notepad.
2. In a new text file, type “This project shows that the file, not the filename, has to change
for the hash value to change.”
3. Click File, Save As from the menu, and save the file as testhash.txt in theC5Prj05
folder on your USB drive. Exit Notepad, and start FTK Imager.
4. Click File, Add Evidence Item from the menu. In the Select Source dialog box, click the
Logical Drive option button, and then click Next.
5. In the Select Drive dialog box, click the Drive Selection list arrow, click to select your
USB drive, and then click Finish.
6. In the upper-left pane, click to expand your USB drive and continue expanding until you
can click the C5Prj05 folder. In the upper-right pane, you should see the testhash.txt file
you created.
7. Right-click the file and click Export File Hash List. Save the file as original hash value in
the C5Prj05 folder on your USB drive. FTK Imager saves it as a .csv file.
8. Click to select your USB drive in the upper-left pane, if necessary, and then click File,
Remove Evidence Item from the menu. Exit FTK Imager.
9. Open Windows Explorer. Right-click the testhash.txt file on your USB drive, and rename
it as testhash.doc. In the error message about the change in extension, click Yes.
10. Start FTK Imager. Follow Steps 4 to 7, but this time when you export the file hash list,
right-click the testhash.doc file, and save it as changed hash value. Exit FTK Imager.
11. Open original hash value and changed hash value in Excel (or another spreadsheet
program). Compare the hash values in both files to see whether they are different, and
then exit Excel.
Download