LAB9_Digital Forensics Technology and Practices_WORKSHEET2 Kwadwo Antwi
docx
keyboard_arrow_up
School
University of Maryland, University College *
*We aren’t endorsed by this school
Course
640
Subject
Information Systems
Date
Dec 6, 2023
Type
docx
Pages
16
Uploaded by joespady4u25
Name: XXXXX
Semester: Summer
Year: 2023
Section Number: 7621
Lab 9 Worksheet Digital Forensics
Technology and Practices
Table of Contents
Introduction
...............................................................................................................................................................
2
Screenshot 1 – Ping of YOURNAME
...........................................................................................................................
3
Screenshot 2 –Yourname-IR Volume Label for the D: Drive
.......................................................................................
4
Screenshot 3 – Yourname as the Incident Responder
................................................................................................
5
Screenshot 4 – Yourname as the Incident Responder with Date and Time
................................................................
6
Screenshot 5 – Psinfo Command Displaying Yourname
.............................................................................................
7
Screenshot 6 – System Information Displaying Yourname
.........................................................................................
8
Screenshot 7 – The MD5 and SHA1 hashes of your MYIRTEXT.TXT file
......................................................................
9
Screenshot 8 – Creating a Yourname RAM Dump File
..............................................................................................
10
Screenshot 9 – Using Dir to Display Yourname RAM Dump File
...............................................................................
11
Screenshot 10 – The MD5 and SHA1 hashes of yourname RAM Dump file
.............................................................
12
Conclusion
...............................................................................................................................................................
13
APA References
........................................................................................................................................................
14
1
Introduction
Students: In the box below, please explain the purpose of doing this lab below and explain how it is relevant to Computer Forensics.
Introduction
The goal of Lab 9 was to do memory forensics utilizing tools to examine volatile data artifacts such as network connections and active processes, parse a RAM snapshot to identify artifacts, and utilize hashing to confirm data integrity. psinfo, volatility, pslist, and tcpcvon are among the commands used in this lab. In order to
ensure that pertinent volatile data is captured before it is lost, memory forensics is essential while conducting computer forensics. Volatile data includes cache, RAM, and system files and is often only stored for a brief period while a computer is operating and would be lost if the device was shut off (Raap, 2020). Memory forensics is when an investigator conducts activity to capture the running memory of a device and then analyzes the output data to identify malicious software (Fox, 2021). When conducting memory forensics, it’s important to understand that it is unlike conducting hard disk forensics in that the investigation focuses on processes that were running when the memory dump was captured, information that would be lost with just a 1 for 1 copy (Fox, 2021). There are various ways that an investigator can obtain memory forensics which include RAW formatting, crash dumping, hibernation files, page files, and a VMWare snapshot (Messina, 2019). The command line tools used in Lab 9 will give incident responders knowledge about the services active on the device. Investigators can quickly determine the active processes on the device using the pslist command ("First
Steps to Volatile Memory Analysis", 2019). The volatility tool or plugin is one of the best resources to use while conducting memory forensics. In both 32-bit and 64-bit systems, volatility enables incident responders to evaluate RAM (Balapure, 2018). Volatility is compatible with a wide range of systems, including Linux, Windows, Mac, and Android ones (Balapure, 2018). There are a variety of commands that may be used with volatility to carry out various tasks, including inspecting active processes, locating kernel specifications, finding dormant or hidden processes, and viewing DLL dumps (Balapure, 2018). Memory forensics is crucial because essential artifacts that would not be present in a hard disk image might be found in memory, and certain 2
malware is engineered to leave no traces on the hard drive.
3
Your preview ends here
Eager to read complete document? Join bartleby learn and gain access to the full version
- Access to all documents
- Unlimited textbook solutions
- 24/7 expert homework help
Screenshot 1 – Ping of YOURNAME
1.
Ping yourname, where yourname is your first name. Take a screenshot of the ping which is using the IPv6 lookback address of ::1. The use of anyone else’s name may result in an academic integrity review by your professor. Please label your screenshot to receive full credit.
Take a screenshot of the Ping of yourname (IPv6 loopback) Image 1: Screenshot of the Ping of my name (IPv6 loopback) 4
Screenshot 2 –Yourname-IR Volume Label for the D: Drive
2.
Label the D: drive, Yourname-IR, where yourname is your first name. The use of anyone else’s name may result in an academic integrity review by your professor. Please label your screenshot to receive full credit.
Take a screenshot of the D: Drive labeled with Yournams-IR Image 2: Screenshot of the D: Drive labeled with Kwadwo-IR
5
Screenshot 3 – Yourname as the Incident Responder
3.
Add your name to the Incident Response text file. The use of anyone else’s name may result in an academic integrity review by your professor. Please label your screenshot to receive full credit.
Take a screenshot of yourname as the Incident Responder
Image 3: Screenshot
o
f my name
as the Incident Responder
6
Your preview ends here
Eager to read complete document? Join bartleby learn and gain access to the full version
- Access to all documents
- Unlimited textbook solutions
- 24/7 expert homework help
Screenshot 4 – Yourname as the Incident Responder with Date and Time
4.
In addition to your name, add the date and time to the Incident Response text file. The use of anyone else’s name may result in an academic integrity review by your professor. Please label your screenshot to receive full credit.
Take a screenshot of yourname as the Incident Responder with the Date and Time
Image 4: Screenshot of my name as the Incident Responder with the Date and Time
7
Screenshot 5 – Psinfo Command Displaying Yourname
5.
Redirect the psinfo command to the incident response text file. Your name from the computer name
will be displayed. The use of anyone else’s name may result in an academic integrity review by your professor. Please label your screenshot to receive full credit.
Take a screenshot of using the psinfo command showing your name for the Computer Name Image 5: screenshot of using the psinfo command showing my name for the Computer Name 8
Screenshot 6 – System Information Displaying Yourname
6.
The System Information in the incident response text file will display your name from the computer name. The use of anyone else’s name may result in an academic integrity review by your professor. Please label your screenshot to receive full credit.
Take a screenshot of System Information in the incident response text file displaying your name
9
Your preview ends here
Eager to read complete document? Join bartleby learn and gain access to the full version
- Access to all documents
- Unlimited textbook solutions
- 24/7 expert homework help
Screenshot 7 – The MD5 and SHA1 hashes of your MYIRTEXT.TXT file.
7.
Take a screenshot of the yourname.txt file hashed with sigcheck. The use of anyone else’s name may
result in an academic integrity review by your professor. Please label your screenshot to receive full credit. It is mathematically possible that you and another student could have the same MD5 hash for
your IR text file. But the chance of that is 1 in 340,282,366,920,938,463,463,374,607,431,768,211,456. For that reason, the hash should be unique
or there may be an academic integrity review by your professor.
Take a screenshot of the MYIRTEXT.TXT file hashed with sigcheck
Image 7: Screenshot of the MYIRTEXT.TXT file hashed with sigcheck
10
Screenshot 8 – Creating a Yourname RAM Dump File
8.
Use DumpIT to create a RAM dump. The RAM dump will have yourname in it from the computer name. It will also have today’s date and time, which should match the timeframe of this course. The use of anyone else’s name may result in an academic integrity review by your professor. Please label your screenshot to receive full credit.
Take a screenshot of using DumpIt to create the RAM Dump with Your Name in it
Image 8: screenshot of using DumpIt to create the RAM Dump with Your Name in it
11
Screenshot 9 – Using Dir to Display Yourname RAM Dump File
9.
The RAM dump will have yourname in it from the computer name. It will also have today’s date and time, which should match the timeframe of this course. The use of anyone else’s name may result in an academic integrity review by your professor. Please label your screenshot to receive full credit.
Take a screenshot of using the DIR command to display the Yourname RAM DUMP File
Image 9: Screenshot of using the DIR command to display my name RAM DUMP File
12
Your preview ends here
Eager to read complete document? Join bartleby learn and gain access to the full version
- Access to all documents
- Unlimited textbook solutions
- 24/7 expert homework help
Screenshot 10 – The MD5 and SHA1 hashes of yourname RAM Dump file.
10.
Take a screenshot of the yourname RAM Dump file hashed with sigcheck. The use of anyone else’s name may result in an academic integrity review by your professor. Please label your screenshot to receive full credit. It is mathematically possible that you and another student could have the same MD5 hash for your IR text file. But the chance of that is 1 in 340,282,366,920,938,463,463,374,607,431,768,211,456. For that reason, the hash should be unique
or there may be an academic integrity review by your professor.
Take a screenshot of the Yourname RAM Dump file hashed with sigcheck
Image 10: Screenshot of my name RAM Dump file hashed with sigcheck 13
Conclusion Conclusion
In Lab 9, we investigated the target device's memory using a variety of command-line tools. No important information will be lost if and when the machine is turned off or disconnected from the network if the volatile data is collected and exported to a text file. Using the PATH command, we first determined the path where the OS searches for executable files. Then, in the program files, we set the path to our reliable tool drive. Next, we used the copy command to transfer the trusted files to the D: drive. After everything was finished, we used the echo command to add our incident responder name to the incident responder file. We updated the incident responder text file in that file with the date and time, network connection information, process list information, and computer information. We used the type of command to view the information, which included the kernel version, product version, kernel build, processors, processing speed, and processor type, after it had been entered into the text file. We used the sigcheck command to hash the incident responder text file after we had confirmed the data in the file. After the file was hashed, a RAM dump of the target device was performed using the dumpit command. To further confirm the accuracy of the data, we also used the sigcheck command on the RAM capture. Finally, we extracted data from the RAM grab using the standalone Volatility Framework. In order
to obtain a thorough image of the target device and to ensure that as much data as possible is gathered to identify the malicious activity, it is essential to understand the techniques used in memory forensics.
14
15
Your preview ends here
Eager to read complete document? Join bartleby learn and gain access to the full version
- Access to all documents
- Unlimited textbook solutions
- 24/7 expert homework help
APA References Balapure, A. (2018). Memory forensics and analysis using volatility - Infosec Resources. Infosec Resources. Retrieved September 11, 2023, from
https://resources.infosecinstitute.com/topic/memory-forensics-and-analysis-using-
volatility
First steps to volatile memory analysis. Medium. (2019). Retrieved September 11, 2023, from https://medium.com/@zemelusa/first-steps-to-volatile-memory-analysis-dcbd4d2d56a1
Fox, N. (2021). Memory Forensics for Incident Response. Varonis.com. Retrieved September 11, 2023, from https://www.varonis.com/blog/memory-forensics
Messina, G. (2019). Computer Forensics: Memory Forensics - Infosec Resources. Infosec Resources. Retrieved September 11, 2023, from https://resources.infosecinstitute.com/topic/computer-forensics-memory-forensics/
Raap, R. (2020). How to Identify Potentially Volatile Data Using Memory Forensics | By Regina Raap.
eForensics. Retrieved September 11, 2023, from https://eforensicsmag.com/how-to-
identify-potentially-volatile-data-using-memory-forensics-by-regina-raap/
16