F 201: Rhino Hunt with Autopsy (15 pts + 10 extra)

What You Need for This Project

Purpose

To practice basic forensic techniques:

Scenario

The city of New Orleans passed a law in 2004 making possession of nine or more unique rhinoceros images a serious crime. The network administrator at the University of New Orleans recently alerted police when his instance of RHINOVORE flagged illegal rhino traffic. Evidence in the case includes a computer and USB key seized from one of the University's labs. Unfortunately, the computer had no hard drive. The USB key was imaged and a copy of the dd image is the case1.zip file you've been given.

In addition to the USB key drive image, three network traces are also available—these were provided by the network administrator and involve the machine with the missing hard drive. The suspect is the primary user of this machine, who has been pursuing his Ph.D. at the University since 1972.

Downloading the Evidence File

On your Windows machine, download this file:

case1.zip (3.4 MB)

F 201.1: Verifying Hash Values (5 pts)

Open a PowerShell window and execute these commands, as shown below.
cd Downloads
Get-FileHash -Algorithm MD5 case1.zip
Get-FileHash -Algorithm SHA1 case1.zip
Verify that the MD5 value matches the value shown below. If it does not, re-download the evidence file.

The flag is the first portion of the SHA1 address, covered by a green rectangle in the image below.

Unzipping the Evidence File

Right-click the case1.zip file and click "Extract All...". Click the Extract button.

You see four files, as shown below.

Creating an Autopsy Case

Launch Autopsy. In the Welcome box, click "New Case".

Make these selections:

When the data file is imported and processed, in the left pane of Autopsy, expand the containers to see the Images and "Deleted Files", as shown below.

F 201.2: Mother and Child (5 pts)

Find the image of a mother rhinoceros and her child. That's the flag.

(If you are using an automated CTF scoreboard, enter the filename of the image as the flag.)

Examining Deleted Files

In the left pane, select All. The deleted files appear in the right pane, as shown below.

Sorting by File Type

In the top right pane, scroll to the right. Click "MIME Type", outlined in red in the image below, to sort the files, and put the "application/msword" file at the top.

Reading the Diary

The "application/msword" file is a diary. Read through it and find the flag below.

F 201.3: Hard Drive (5 pts)

Find the location of the missing hard drive. That's the flag.

F 201.4: Email Address (10 pts extra)

There are two files containing an email address at MIT. Only one of the files has a real filename. (A filename beginning with "Unalloc" is a fake filename generated by Autopsy for files recovered from unallocated clusters.)

The flag is the real filename, which does not begin with "Unalloc".

Posted: 8-26-22
Directory selection step added 10-12-22
Video added 3-12-23
Minor correction 6-19-23
F 201.2 flag description updated 6-19-23
"Select All" added to step 4 c. 6-24-23
Flag 4 description augmented 7-15-23
Powershell Hashing info added 1-31-24
PowerShell Hashing info updated 2-6-24
Flag 4 description updated 2-13-24