F 201: Rhino Hunt with Autopsy (15 pts + 10 extra)

What You Need for This Project

Purpose

To practice basic forensic techniques:

Scenario

The city of New Orleans passed a law in 2004 making possession of nine or more unique rhinoceros images a serious crime. The network administrator at the University of New Orleans recently alerted police when his instance of RHINOVORE flagged illegal rhino traffic. Evidence in the case includes a computer and USB key seized from one of the University’s labs. Unfortunately, the computer had no hard drive. The USB key was imaged and a copy of the dd image is the case1.zip file you’ve been given.

In addition to the USB key drive image, three network traces are also available—these were provided by the network administrator and involve the machine with the missing hard drive. The suspect is the primary user of this machine, who has been pursuing his Ph.D. at the University since 1972.

Downloading the Evidence File

On your Windows machine, download this file:

case1.zip (3.4 MB)

Verifying the Hash Value

If you don't already have it, download Hashcalc from

https://www.slavasoft.com/download.htm

Install Hashcalc. Launch it.

Drag the case1.zip file and drop it on the Hashcalc window.

You see various hash values, including MD5 and SHA1, as shown below.

F 201.1: SHA1 (5 pts)

Verify that the MD5 value matches the value shown below. If it does not, re-download the evidence file.

The flag is the first portion of the SHA1 address, covered by a green rectangle in the image below.

Unzipping the Evidence File

Right-click the case1.zip file and click "Extract All...". Click the Extract button.

You see four files, as shown below.

Creating an Autopsy Case

Launch Autopsy. In the Welcome box, click "New Case".

Make these selections:

When the data file is imported and processed, in the left pane of Autopsy, expand the containers to see the Images and "Deleted Files", as shown below.

F 201.2: Mother and Child (5 pts)

Find the image of a mother rhinoceros and her child. That's the flag.

Examining Deleted Files

In the left pane, select All. The deleted files appear in the right pane, as shown below.

Sorting by File Type

In the top right pane, scroll to the right. Click "MIME Type", outlined in red in the image below, to sort the files, and put the "application/msword" file at the top.

Reading the Diary

The "application/msword" file is a diary. Read through it and find the flag below.

F 201.3: Hard Drive (5 pts)

Find the location of the missing hard drive. That's the flag.

F 201.4: Email Address (10 pts extra)

There are two files containing an email address at MIT. Only one of the files has a filename.

That filename is the flag.

Posted: 8-26-22