Cf-practical 1 - 6
Cf-practical 1 - 6
Practical No – 1
Steps:
2. Select the source you want to make an image of and click Next.
If you select Logical Drive to select a floppy or CD as a source, you can check the Automate
multiple removable media box to create groups of images. Imager will automatically
increment the case numbers with each image, and if something interrupts the process, you
may assign case number manually.
3. Select the drive or browse to the source of the image you want, and then click Finish.
1
Class:- TYCS Semester - VI Subject:- Cyber Forensics (Practical)
Roll No: 136
● You can compare the stored hashes of your image content by checking the
Verify images after they are created box. If a file doesn’t have a hash, this option will
generate one.
● You can list the entire contents of your images with path, creation dates, whether
files were deleted, and other metadata. The list is saved in a tab-separated value
format
2
Class:- TYCS Semester - VI Subject:- Cyber Forensics (Practical)
Roll No: 136
5. Select the type of image you want to create, and then click Next.
Note: If you are creating an image of a CD or DVD, this step is skipped because all
CD/DVD images are created in the IsoBuster CUE format.
The raw image type is not compressed. If you select the Raw (dd) type, be sure to have
adequate space for the resulting image.
If you select SMART or E01 as the image type, complete the fields in the Evidence Item
Information dialog, and click Next.
Raw (dd): This is the image format most commonly used by modern analysis tools. These
raw file formatted images do not contain headers, metadata, or magic values. The raw format
typically includes padding for any memory ranges that were intentionally skipped (i.e.,
device memory) or that could not be read by the acquisition tool, which helps maintain
spatial integrity (relative offsets among data).
SMART: This file format is designed for Linux file systems. This format keeps the disk
images as pure bitstreams with optional compression. The file consists of a standard 13-byte
header followed by a series of sections. Each section includes its type string, a 64-bit offset
3
Class:- TYCS Semester - VI Subject:- Cyber Forensics (Practical)
Roll No: 136
to the next section, its 64-bit size, padding, and a CRC, in addition to actual data or
comments, if applicable.
E01: this format is a proprietary format developed by Guidance Software’s EnCase. This
format compresses the image file. An image with this format starts with case information in
the header and footer, which contains an MD5 hash of the entire bit stream. This case
information contains the date and time of acquisition, examiner’s name, special notes and an
optional password.
AFF: Advance Forensic Format (AFF) was developed by Simson Garfinkel and Basis
Technology. Its latest implementation is AFF4. The goal is to create a disk image format that
does not lock the user into a proprietary format that may prevent them from being able to
properly analyze it.
6. In the Image Destination Folder field, type the location path where you want to save
the image file, or click Browse to find to the desired location.
Note: If the destination folder you select is on a drive that does not have sufficient
free space to store the entire image file, FTK Imager prompts for a new destination
folder when all available space has been used in the first location.
7. In the Image Filename field, specify a name for the image file but do not specify a file
extension.
8. In the Image Fragment Size field, specify the maximum size in MB for each fragment
of the image file. The s01 format is limited by design to sizes between 1 MB and 2047
MB (2 GB). Compressed block pointers are 31- bit numbers (the high bit is a
compressed flag), which limits the size of any one segment to two gigabytes.
Tip: If you want to transfer the image file to CD, accept the default fragment size of
650 MB.
11. Click Start to begin the imaging process. A progress dialog appears that shows the
following:
⮚ The source that is being imaged
⮚ The location where the image is being saved
⮚ The status of the imaging process
⮚ A graphical progress bar
⮚ The amount of data in MB that has been copied and the total amount to
be copied
⮚ Elapsed time after the imaging process began
⮚ Estimated time left until the process is complete
5
Class:- TYCS Semester - VI Subject:- Cyber Forensics (Practical)
Roll No: 136
Now select the source evidence type as physical drive, logical drive or image file. We have
selected image file and click on next.
Select virtual drive image & click on open option. Select the source path and click on finish.
6
Class:- TYCS Semester - VI Subject:- Cyber Forensics (Practical)
Roll No: 136
Now select Evidence Tree and analyze the virtual disk as physical disk.
Similarly to add raw image select again add evidence item and click on image file and click
on open option.
Click on finish.
Now raw image will be added as physical drive to analyze.
Practical No – 2
Steps:
Enable USB Write Block in Windows 10, 8 and 7 using registry
7
Class:- TYCS Semester - VI Subject:- Cyber Forensics (Practical)
Roll No: 136
1. Press the Windows key + R to open the Run box. Type regedit and press Enter.
2. This will open the Registry Editor. Navigate to the following key:
HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Control
3. Right-click on the Control key in the left pane, select New -> Key.
4. Name it as StorageDevicePolicies.
5. Select the StorageDevicePolicies key in the left pane, then right-click on any empty
space in the right pane and select New -> DWORD (32-bit) Value. Name it
WriteProtect.
8
Class:- TYCS Semester - VI Subject:- Cyber Forensics (Practical)
Roll No: 136
7. The new setting takes effect immediately. Every user who tries to copy / move data to
USB devices or format USB drive will get the error message “The disk is write-
protected”.
8. We can only open the file in the USB drive for reading, but it’s not allowed to modify
and save the changes back to USB drive.
So this is how you can enable write protection to all connected USB drives. If you want to
disable write protection at a later time, just open Registry Editor and set the WriteProtect
value to 0.
9. Now Create image of the USB drive using FTK imager
9
Class:- TYCS Semester - VI Subject:- Cyber Forensics (Practical)
Roll No: 136
10. Select the USB drive folder by browsing and click next &
10
Class:- TYCS Semester - VI Subject:- Cyber Forensics (Practical)
Roll No: 136
● You can compare the stored hashes of your image content by checking the Verify
images after they are created box. If a file doesn’t have a hash, this option will
generate one.
● You can list the entire contents of your images with path, creation dates, whether
files were deleted, and other metadata. The list is saved in a tab-separated value
format
Select the type of image you want to create, and then click Next
Practical No – 3 Aim:
Forensics Case Study:
- Solve the Case study (image file) provide in lab using Autopsy
Steps:
1. Start Autopsy
11
Class:- TYCS Semester - VI Subject:- Cyber Forensics (Practical)
Roll No: 136
12
Class:- TYCS Semester - VI Subject:- Cyber Forensics (Practical)
Roll No: 136
5. Select Data Source( here a previously made image file of a USB is selected)
6. Select all ingest modules
13
Class:- TYCS Semester - VI Subject:- Cyber Forensics (Practical)
Roll No: 136
7.Wait for Data source to process and be added to local database. Click Finish
8. Now Autopsy window will appear and it will analyzing the disk that we have selected
14
Class:- TYCS Semester - VI Subject:- Cyber Forensics (Practical)
Roll No: 136
9. All files will appear in table tab select any file to see the data.
10. Expand the tree from left side panel to view the files and then expand the deleted files
node
11. To recover the file, go to view node-> Deleted Files node , here select any file and right
click on it than select Extract Files option.
15
Class:- TYCS Semester - VI Subject:- Cyber Forensics (Practical)
Roll No: 136
16
Class:- TYCS Semester - VI Subject:- Cyber Forensics (Practical)
Roll No: 136
17
Class:- TYCS Semester - VI Subject:- Cyber Forensics (Practical)
Roll No: 136
14. Click on Generate Report from autopsy window and Select the Excel format and click on
next
18
Class:- TYCS Semester - VI Subject:- Cyber Forensics (Practical)
Roll No: 136
19
Class:- TYCS Semester - VI Subject:- Cyber Forensics (Practical)
Roll No: 136
Now Report is Generated So click on close Button, We can see the Report on Report Node.
Double click on the excel file and open it to view the report
20
Class:- TYCS Semester - VI Subject:- Cyber Forensics (Practical)
Roll No: 136
21
Class:- TYCS Semester - VI Subject:- Cyber Forensics (Practical)
Roll No: 136
Practical No – 4
Steps:
Capturing Packets
As soon as you single-click on your network interface’s name, you can see how the packets are
working in real time. Wireshark will capture all the packets going in and out of our systems.
Promiscuous mode is the mode in which you can see all the packets from other systems on the
network and not only the packets send or received from your network adapter. Promiscuous mode
is enabled by default. To check if this mode is enabled, go to Capture and Select Options. Under
this window check, if the
checkbox is selected and activated at the bottom of the window. The checkbox says “Enable
promiscuous mode on all interfaces”.
22
Class:- TYCS Semester - VI Subject:- Cyber Forensics (Practical)
Roll No: 136
The red box button “STOP” on the top left side of the window can be clicked to stop the capturing
of traffic on the network.
2. Now go on browser and open any unsecured website i.e www.razorba.com and
3. perform some activity on the website.
4. Now come back to Wireshark and enter http in the search bar.
23
Class:- TYCS Semester - VI Subject:- Cyber Forensics (Practical)
Roll No: 136
Color Coding
Different packets are seen highlighted in various different colors. This is Wireshark’s way of displaying
traffic to help you easily identify the types of it. Default colors are:
Black color identifies packets with errors – example these packets are delivered in an unordered
manner.
To check the color coding rules click on View and select Coloring Rules. These color coding rules can be
customized and modified to fit your needs.
24
Class:- TYCS Semester - VI Subject:- Cyber Forensics (Practical)
Roll No: 136
First of all, click on a packet and select it. Now, you can scroll down to view all its details.
25
Class:- TYCS Semester - VI Subject:- Cyber Forensics (Practical)
Roll No: 136
Filters can also be created from here. Right-click on one of any details. From the menu select Apply
as Filter drop-down menu so filter based on it can be created.
26
Class:- TYCS Semester - VI Subject:- Cyber Forensics (Practical)
Roll No: 136
ip.addr == 172.18.0.4
ip.src == 172.18.123
27
Class:- TYCS Semester - VI Subject:- Cyber Forensics (Practical)
Roll No: 136
ip.dst == 172.18.0.123
28
Class:- TYCS Semester - VI Subject:- Cyber Forensics (Practical)
Roll No: 136
http
http.request
tcp
29
Class:- TYCS Semester - VI Subject:- Cyber Forensics (Practical)
Roll No: 136
http.response.code==200
30
Class:- TYCS Semester - VI Subject:- Cyber Forensics (Practical)
Roll No: 136
tcp.port==80 || udp.port==80
31
Class:- TYCS Semester - VI Subject:- Cyber Forensics (Practical)
Roll No: 136
Practical No – 5
Aim: Analyze the packets provided in lab and solve the questions using Wireshark:
-What web server software is used by www.snopes.com?
-About what cell phone problem is the client concerned?
-According to Zillow, what instrument will Ryan learn to play?
-How many web servers are running Apache?
-What hosts (IP addresses) think that jokes are more entertaining when they
are explained?
Steps:
Analysis – The domain name be found from host header so we will set host
header column where we will see all domain name. Select any HTTP request and
expand the Hypertext Transfer Protocol then right click on Host header and then
Apply as Column.
32
Class:- TYCS Semester - VI Subject:- Cyber Forensics (Practical)
Roll No: 136
33
Class:- TYCS Semester - VI Subject:- Cyber Forensics (Practical)
Roll No: 136
Right click on the selected packet and then select Follow TCP stream.
Now we can see the webserver name in server header it is Microsoft IIS 5.0
34
Class:- TYCS Semester - VI Subject:- Cyber Forensics (Practical)
Roll No: 136
2.
About what cell phone problem is the client
concerned?
Analysis – Client talking about cell so we search for cell keyword in whole
packets. We will use regular express for searching the cell keyword. Apply
frame matches “(?!) cell” or frame matches cell
35
Class:- TYCS Semester - VI Subject:- Cyber Forensics (Practical)
Roll No: 136
After applying the filter now, we will start to check every HTTP request. We
noticed in the first HTTP request cell keyword is in URL and it was about cell
phone charging issue.
3.
According to Zillow, what instrument will Ryan learn
to play?
Analysis – As we did in the last challenge, we will apply a regular express filter
for the Zillow keyword. Apply frame matched “(?!) zillow” or frame matches
zillow
36
Class:- TYCS Semester - VI Subject:- Cyber Forensics (Practical)
Roll No: 136
After applying the filter, we found only one packet with the Zillow keyword
Select the packet and expand the Hypertext Transfer Protocol tab right click on it
go to Protocol Preferences and check Allow subdissector to resemble TCP stream.
37
Class:- TYCS Semester - VI Subject:- Cyber Forensics (Practical)
Roll No: 136
Now go to file and select Export Objects > HTTP. It will save all objects from the
packet.
38
Class:- TYCS Semester - VI Subject:- Cyber Forensics (Practical)
Roll No: 136
4.
Analysis – The web server name can be retrieved from HTTP response header. So
will apply filter http. response and we can see all http response packets.
Now we will set the server header as column select any packet and right click on
it then select Apply as Column.
40
Class:- TYCS Semester - VI Subject:- Cyber Forensics (Practical)
Roll No: 136
now we have to check how many Apache packets are there we can’t count
manually for each packet so we will apply another filter http.server contains
“Apache”
41
Class:- TYCS Semester - VI Subject:- Cyber Forensics (Practical)
Roll No: 136
42
Class:- TYCS Semester - VI Subject:- Cyber Forensics (Practical)
Roll No: 136
Check the limit to display filter then it will show the actual Apache connections.
43
Class:- TYCS Semester - VI Subject:- Cyber Forensics (Practical)
Roll No: 136
44
Class:- TYCS Semester - VI Subject:- Cyber Forensics (Practical)
Roll No: 136
Practical No – 6
Aim: Using Sysinternals tools for Network Tracking and Process Monitoring:
-Check Sysinternals tools
-Monitor Live Processes
-Capture RAM-Capture
-TCP/UDP packets
-Monitor Hard Disk
-Monitor Virtual Memory
-Monitor Cache Memory
Steps:
1) Check Sysinternals tools
Windows Sysinternals tools are utilities to manage, diagnose, troubleshoot, and monitor a
Microsoft Windows environment
45
Class:- TYCS Semester - VI Subject:- Cyber Forensics (Practical)
Roll No: 136
46
Class:- TYCS Semester - VI Subject:- Cyber Forensics (Practical)
Roll No: 136
Click on capture.
47
Class:- TYCS Semester - VI Subject:- Cyber Forensics (Practical)
Roll No: 136
48
Class:- TYCS Semester - VI Subject:- Cyber Forensics (Practical)
Roll No: 136
49
Class:- TYCS Semester - VI Subject:- Cyber Forensics (Practical)
Roll No: 136