COEN 152 / 252 Spring 2011 Final Examination 1. Ethics Throughout the course we have discussed the multiple ethical challenges faced as a forensics practitioner. Being mindful of our discussions and the Markkula Center for Applied Ethics Framework, describe which of the approaches is most workable for you. Apply that perspective to the following ethical problem: A law enforcement community develops the Ruminant, a program that monitors all electronic communication through a given internet site. Ruminant generates a listing of email for human consumption according to rather narrow search criteria as spelled out in a search warrant. Is deploying Ruminant ethical? 2. Legal We have discussed the guidelines established by the Daubert case. Describe these guidelines in your own words. Why are they important? How do they impact the admissibility of digital evidence? 3. Network Sniffing In the following simulated scenario, we suspect a backdoor into a machine, bobadilla.engr.scu.edu. We captured traffic, available as a Wireshark capture file: (http://www.engr.scu.edu/~tscocca/COEN252_09/PracticalFinal/capture.pcap) and also used fport with this result: (http://www.engr.scu.edu/~tscocca/COEN252_09/PracticalFinal/cap112407html.html) Analyze the TCP connections open during the capture time and ascertain whether they are suspicious or not? 4. Evidence Processing Chain of custody; describe the concept. What is its importance in the analysis of digital evidence? Give an example of the proper chain of custody in the handling of an item of digital evidence. 5. Windows Artifacts In Lab 5, use ProDiscover or FTK Imager to locate the SID stings for each account that is present in the image. Identify the SID for each account and describe which “user” the account is associated with. In and analysis scenario, what is the importance of this SID? 1 6. File Headers In Lab 5, use ProDiscover or FTK Imager to locate the two files that Howie sent to Joe. What are the names of these files? For this file type, describe the unique file header that can be used to located files of this type by using a string search. 7. Email Investigation The following email was received at my Yahoo mail account. Apparently someone wishes to return an ATM card to me that I never lost. There are of course fees associated with this return. Examine the email and for all domains and IP addresses, provide available details about the domain owners. You may use and email header tracing site to gather this information. Ensure the information is accurate before you rely on it for your answer. Provide attribution for the tracing site used to get your answer. (Note: X-YMailISG: value has been truncated in the interest of saving space.) From Dr. Mathias Bello Sat Jun 4 16:39:41 2011 X-Apparently-To: tscocca@yahoo.com via 68.142.200.134; Sat, 04 Jun 2011 16:39:36 -0700 Return-Path: <emaill5585999@mail.com> X-YahooFilteredBulk: 195.4.92.98 Received-SPF: none (mta1475.mail.mud.yahoo.com: domain of emaill5585999@mail.com does not designate permitted sender hosts) X-YMailISG: G4I8AEccZArEBtNDy3wF.RssP61kl1kGTgQ2xqihAKft6h2V...................... X-Originating-IP: [195.4.92.98] Authentication-Results: mta1475.mail.mud.yahoo.com from=mail.com; domainkeys=neutral (no sig); from=mail.com; dkim=neutral (no sig) Received: from 127.0.0.1 (EHLO mout8.freenet.de) (195.4.92.98) by mta1475.mail.mud.yahoo.com with SMTP; Sat, 04 Jun 2011 16:39:31 -0700 Received: from [195.4.92.27] (helo=17.mx.freenet.de) by mout8.freenet.de with esmtpa (ID gordon.kleinau@team-atlas.de) (port 25) (Exim 4.76 #2) id 1QT0RD-0000DP-B9; Sun, 05 Jun 2011 01:39:27 +0200 Received: from [46.166.129.140] (port=3999 helo=User) by 17.mx.freenet.de with esmtpa (ID gordon.kleinau@team-atlas.de) (port 587) (Exim 4.72 #5) id 1QT0RC-0004Zo-W7; Sun, 05 Jun 2011 01:39:27 +0200 Reply-To: <off1cemail03@yahoo.co.jp> From: "Dr. Mathias Bello"<emaill5585999@mail.com> Subject: GET BACK TO US Date: Sun, 5 Jun 2011 00:39:41 +0100 MIME-Version: 1.0 Content-Type: multipart/mixed; boundary="----=_NextPart_000_0120_01C2A9A6.52F4484E" X-Priority: 3 X-MSMail-Priority: Normal X-Mailer: Microsoft Outlook Express 6.00.2600.0000 X-MimeOLE: Produced By Microsoft MimeOLE V6.00.2600.0000 Message-ID: <1QT0RC-0004Zo-W7@17.mx.freenet.de> Content-Length: 3638 2 8. Data Analysis When considering the analysis of a digital evidence item, why is the operational environment of that system or device a factor? 9. Data Attribution Given that an HTML file appears in a browser cache area, list 3 examples of how this could happen without the browser having written the content to the cache? How would you use other artifacts to identify the resource that deposited the HTML file? 10. Legal When considering the use of a digital evidence analysis tool, why is validation of the output of that tool important? When considered in the context of a legal proceeding, discuss the impact of tool validation on expert testimony that may be necessary during a proceeding. 11. Forensic Duplication You were introduced to the concept of a forensic duplicate of digital media. Describe in your own words why this concept developed and how it is employed in the examination of digital media? Be sure to include in your description the impact of the “Best Evidence” rule. 3