CNIT 121 Proj X5: Sleuthkit and Autopsy (15 pts.)

What You Need for This Project

Purpose

Sleuthkit and Autopsy are a free, open-source forensic analysis system, comparable to FTK or EnCase.

They are less pretty and harder to use, but you can't beat the price.

Connect the Network

In Virtual Machine Properties, connect the network adapter so your VM can reach the Internet.

Getting the Evidence

We'll use the same evidence file you analyzed earlier with FTK.

In the Linux VM, on the desktop, double-click the LXTerminal icon.

In the Terminal window, execute the commands below.

They download the file, extract it, rename it to remove the .001 file extension, and calculate the MD5 hash of the evidence disk.

apt-get update

apt-get install curl -y

cd

mkdir anon

cd anon

curl https://samsclass.info/121/proj/anon-dd.zip > anon-dd.zip

unzip anon-dd.zip

cd dd

mv anon1.dd.001 anon1.dd

md5sum anon1.dd

The MD5 should match the value shown below, ending in 4419:

Adjusting Monitor Resolution

The default screen is 800x600, which is too small for convenience.

From the Deft desktop, click d, Preferences, "Monitor Settings", as shown below.

Adjust to resolution to a higher value, such as 1280x1024, as shown below. Then click Save.

Starting Autopsy

In Deft, click d, DEFT, Analysis, Autopsy, as shown below.

Autopsy opens, as shown below on this page. You will see a warning that Javascript is enabled. You can just ignore it.

Opening a New Case in Autopsy

In the Autopsy window, click the "New Case" button.

Fill in the form as shown below, replacing "Your-Name" with your own name. Don't use any spaes.

Click the "New Case" button.

In the "Creating Case" window, click the "Add Host" button.

In the "Add a New Host" window, accept the default options and click the "Add Host" button.

In the "Adding host" window, click the "Add Image" button.

In the next window, click the "Add Image File" button.

In the "Add a New Image" window, enter in these options, as shown below on this page:

Click Next.

In the "Image File Details" section, click the "Calculate the hash value for this image" button, as shown below. Click Add.

The next screen shows the MD5 hash, ending in 4419, as shown below on this page.

Click OK.

Searching in Autopsy

The "Select a volume to analyze or add a new image file" window appears, as shown below on this page. Click the Analyze button.

In the next window, click the "Keyword Search" tab.

In the search box, type anon as shown below. Click the Search button.

Results of the Search

It finds "120 hits", as shown below on this page:

Examining the Hits

On the left side, click the first few blue Ascii links to see the details of the hits in the right pane, as shown below.

Notice how clumsy this is--you need to use the mouse to click each item; they aren't grouped into the 22 files for you the way FTK did, and the preview is poorly formatted so you can only see a small part of a horizontal line.

Even with those inconveniences, you should be able to find the incriminating email message you found in the FTK project--clear evidence of a crime.

When you find an incriminating email message, save a screen image.

Saving a Screen Image

Make sure your screen shows an obviously incriminating email message.

Click in the host system, on the taskbar. Capture the whole desktop with the PrintScrn button.

YOU MUST SUBMIT A WHOLE-DESKTOP IMAGE FOR FULL CREDIT.

Save the image with the filename "Your Name Proj X5a".

File Analysis

In the search results page, at the upper right, click Close.

In the Case Gallery page, click C:\, as shown below:

At the lower left, click the Analyze button.

At the top left of the next screen, click the "File Analysis" button.

A list of files appears, as shown below.

Notice the four timestamps on each file: Written, Accessed, Changed, and Created. This is a strong point of Autopsy: it finds all four timestamps, while FTK finds only three of them.

Try searching through the files for images. Unfortunately, Sleuthkit doesn't gather all the images together to make this easy the way FTK does.

You should be able to find the kitten image shown below.

Recovering Deleted Files

On the left side, near the bottom, click "ALL DELETED FILES".

Four filenames appear, but three of them have size zero. There are images in this data file showing Guy Fawkes masks, but although FTK found them, Sleuthkit did not.

In the upper pane, click the last item "C:/untitled.bmp".

The lower pane shows the Contents of the file in unreadable ASCII, as shown below.

To recover the deleted file, in the center right, click the blue Export link, indicated by the blue arrow in the image above.

A box pops up, as shown below.

Click "Save File".

In Firefox, in the top right, click the downloads arrow, indicated by the blue arrow in the image below.

In the list of downloads, click on vol2-C.untitled.bmp, as shown below.

A photo with two kittens appears, as shown below.

Saving a Screen Image

Make sure your screen shows the two kittens, as shown above.

Click in the host system, on the taskbar. Capture the whole desktop with the PrintScrn button.

YOU MUST SUBMIT A WHOLE-DESKTOP IMAGE FOR FULL CREDIT.

Save the image with the filename "Your Name Proj X5b".

Turning in your Project

Email the image to cnit.121@gmail.com with the subject line: Proj X5 from YOUR NAME
Last modified 10-13-16