CS 693 Lab 2

.docx

School

Boston University *

*We aren’t endorsed by this school

Course

693

Subject

Computer Science

Date

Apr 3, 2024

Type

docx

Pages

18

Uploaded by CoachRook2818

MET CS 693_Lab2_Jimin Choi MET CS 693 Digital Forensics and Investigations (Fall 2023) Laboratory Report 2 Forensic Examiner – Jimin Choi 10/12/2023 Table of Contents: Hardware and Software used 2 Purposes 2 Step-by-Step instructions with- 3 Screenshots and Comments Summary 15 Review Question and Answers 16 References 18 1
MET CS 693_Lab2_Jimin Choi Hardware and Software used Hardware: - Model: 11th Gen Intel® Core (TM) i7-11800H @ 2.30GHz (16 CPUs) ~2.3GHz - Memory: 32.0GB - Devices: LENOVO Legion 5 Pro 82JF, Kingston DT101 G2 16.0GB USB - Citrix Workspace with Windows 10 Pro 64-bit Software - Operating System: Windows 11 Home 64-bit (10.0, Build 22621) - BIOS: H1CN33WW, 7/18/2021, mode UEFI, BaseBoard Product LNVNB161216 - Virtual Machine: Windows 10 Pro 64-bit (10.0, Build 19045), Memory 8GB, Processor Intel® Xeon® Platinum 8272CL CPU @ 2.60GHz (2 CPUs) ~2.6 GHz, HD 100 GB, Network Microsoft Hyper-V Purposes Lab 2-1 The primary purpose of this lab is to explore and learn how to securely and adequately format a storage device, USB, in this case. Deleting files and emptying the recycle bin in the computer does not mean files are permanently erased from the system. The information and its fragments can remain in the file system and be recoverable through the process known as data carving (Nelson, 2018). Lab 2-2 During the digital forensic investigation, it is critical to protect the evidence to avoid any damages and alterations (Nelson, 2018). Directory Snoop allows the creation of a bit-stream copy of the original storage media. Then, investigators can analyze the storage media and recover evidence safely. Lab 2-3 This lab aims to explore the features of a digital forensics tool, FTK Imager, it provides additional functions than the non-forensics tool, Directory Snoop (Nelson, 2018). FTK Imager validates a copy of the storage media with an MD5 and SHA-1 hash, which has a better security function (Nelson, 2018). It also compresses data to reduce the file size. Additionally, FTK can convert the bit-stream copy from Directory Snoop to an E01 format file, which is compressed to a much smaller size so investigators can easily handle it. Lab 2-4 According to the Nelson (2018), FTK Imager allows investigators to recover deleted files, passwords, and encrypted files by examining Registry files. In this lab, I will create a .E01 image file of the USB drive after deleting some existing files. 2
MET CS 693_Lab2_Jimin Choi Lab 2-5 The primary purpose of this lab is to analyze the image file created in Lab 2-4 to see if I can restore deleted files from the Registry viewer in FTK Imager to readable files. Step-by-Step instructions with screenshots and comments Module 2 Lab Activities: Lab 2.1 Wiping a USB Drive Securely (Skips steps 1 to 6 as Directory Snoop is already installed in the virtual machine.) 7. Download random files in Emulated USB (U:) folder. Then delete all files. *Make sure the folder is empty. 8. From the desktop, double click DS-NTFS (DSNOOP) icon to launch Directory Snoop 5.11 program. Then select U: drive on the select drive toolbar. * There are two types of programs: DS-NTFS and DS-FAT. NTFS and FAT are types of file systems. If you look at the properties of Emulated USB (U:), the file system is NTFS. To launch the program in this particular virtual environment, I needed to get administrative access. I launched the program with a given administrator account. 3
MET CS 693_Lab2_Jimin Choi 9. From the upper icon tabs, click wipe icon , then select ‘ free drive space .’ 10. In the Wipe Free Drive Space window, select Simple 1-pass for Wipe method then click Ok to wipe all data. * There are four types of wiping methods: Simple 1-pass, DoD 3-pass, DoD 7-pass, and Gutmann 35-pass. The higher the number of passes, the more secure the wiping process, and it takes longer time to be done. It overwrites the existing data to make it unrecoverable through the number of steps of passes. For example, DoD stands for the Department of Defense, and the DoD pass method uses a media sanitization standard called DoD 5220.22-M. DoD 3-pass refers to using DoD 5220.22-M three times to overwrite with verification (Mehta, 2022). It only took 30 seconds to complete the process using the simple 1-pass method in this lab. If I had larger files, it would take longer. 4
MET CS 693_Lab2_Jimin Choi 11. Open the Disk Management program and right-click on the drive (Emulated USB (U:)), select Format . *Again, I needed administrative access to format the drive in this virtual environment. I launched CMD with the administrator account and then typed diskmgmt.msc to open the Disk Management program. 12. In the Format dialog box , I changed the volume label to Evidence and the file system to NTFS . 5
MET CS 693_Lab2_Jimin Choi 13. I downloaded and extracted the C2Proj1 file and moved all files to the Evidence (U:) folder. Lab 2.2 Using Directory Snoop to Image a USB Drive 1. Launch the DS-NTFS program. Select your drive. In the lower right corner, select the very last cluster under the Drive Clusters panel. *The last cluster of 11 files was 261886, that means there are 261886 clusters. 6
Your preview ends here
Eager to read complete document? Join bartleby learn and gain access to the full version
  • Access to all documents
  • Unlimited textbook solutions
  • 24/7 expert homework help