Loading...

Messages

Proposals

Stuck in your homework and missing deadline? Get urgent help in $10/Page with 24 hours deadline

Get Urgent Writing Help In Your Essays, Assignments, Homeworks, Dissertation, Thesis Or Coursework & Achieve A+ Grades.

Privacy Guaranteed - 100% Plagiarism Free Writing - Free Turnitin Report - Professional And Experienced Writers - 24/7 Online Support

Encase manual

19/12/2020 Client: saad24vbs Deadline: 7 Days

Advanced Computer Forensics


Windows EnCase Forensics Lab

Due date: Please submit your work to Windows EnCase Lab dropbox by July 2nd, 2013.


Lab Setup for using RLES vCloud


This lab is designed to function on the RLES vCloud. The interface is available by navigating to https://rlesvcloud.rit.edu/cloud/org/NAT. If you did the Linux forensics lab on RLES vCloud, you should have created a vApp with the Linux VMware image. If you did not use the RLES vCloud for your first lab, please follow the instruction described in the Linux Forensics Lab to create a vApp. Now, you will add the vApp template, Windows 7 w/FTK 7 EnCase image, from the Public Catalogs to the same vApp following the instruction of Add Virtual Machines to a vApp (Page 8 in RLES vCloud User Guide) with the following setting:


· Set network to be Net_Network


· Select DHCP to create an IP address (when you use DHCP, fencing option is NOT necessary.)


Note: If you get an error when trying to start a vApp (or a VM within a vApp), try these steps:


1. Open up your vApp and click on the Virtual Machines tab. Right-click your VM and choose "Properties".


2. Click on the Hardware tab. At the bottom of the page, click on the MAC address and choose "Reset".


3. Click OK. When it asks if you want to enable guest customization, click No.


4. Give it a minute to update your VM, then try starting it.


Power on the Windows Virtual machine and login to the system with:


Username: Student


Password: student


EnCase 7 is installed on the virtual machine. When you start the EnCase application, you should see “EnCase Forensic (not Acquisition)” on the top of the application.


EnCase 7 Tutorial


· The EnCase Forensics V7 User Guide posted in myCourses under Hands-on Labs.


· EnCase 7 Essentials webinar series at http://www.encaseondemand.com/EnCasev7Essentials/tabid/2617/index.aspx


The following image files will be used for this lab and they are located in the local drive E:\


1) WinLabRaw.img – Raw Image from dd


2) WinLabEnCase.E01 -- EnCase evidence file


Note: “WinLabEnCase Image” in this documentation = “Lab5 image” in your EnCase image.


PART I: Familiar with EnCase


Exercise 1: Starting a New Case

Launch EnCase for Windows – make sure that you are in the EnCase forensics mode (on the top of the software, you should see EnCase Forensic Training, NOT acquisition mode.)


Click the “New Case” button under CASE FILE to begin a new case.


Use the #1 Basic Template and name the case “Case 1”


Record the defaults that EnCase gives you for its folders. It is safe to use these defaults in our experiments.


Add a Raw Image to the exist case

You can add a raw disk image, for example, the dd image, to your case.


Click EVIDENCE > Add Evidence, then click Add Raw Image


Enter “WinLabRaw Image” in the “Name” field.


Under “Image Type” choose “Disk” and click “OK”.


Under Component Files, click New, locate and select the “WinLabRaw.img” file from E:\


The image will now be added to your case. Double click on the hyperlink of WinLbRaw Image, you will be able to view the files and folders from the image.


Question 1: What is the file system of this raw Image?


(Hint: 1. Check “report” from the bottom pane OR


2. choose “Disk View…” from the top drop-down disk manual, image1.png


then click the first sector (in red), the volume boot, image2.png


and read the text in the bottom pane.)


Question 2: What is the first character (in Hex) of the filename of a deleted file (check week 6 lecture recording)?


Add the EnCase Image, WinLabEnCase.E01 located at E:\, to the exist case via EnCase’s “Add Evidence” from the top menu, choose Add Evidence File…


Question 3: What type of files can be added using EnCase’s “Add Evidence Files”


Now you have two evidences added into the case. You can view either one by selecting View->Evidence from the top View menu.


Exercise 2: Using Encase


Set the Time Zone

EnCase v7 will utilize the time zone setting of your examiner workstation if no time zone is set for the evidence.


When you acquire a computer as evidence it is important to make note of the computer’s time and time zone, especially if you need to correlate evidence from different time zones (never assume the time or time zone on a computer is correct.)


Question 4: Where does the Time Zone information reside in a Windows system? (Hint: See EnCase 7 User guide, page 122 or watch Processing Evidence Part 1 from http://www.encaseondemand.com/EnCasev7Essentials/tabid/2617/index.aspx).


Before starting the evidence analysis, you should verify that time zone settings for the evidence are configured properly and modify the time zone setting if necessary.


In our case, since we did not include the complete Windows’ image, let’s assume the computer’s time zone is North American Eastern Time Zone time zone. Verify the time zone setting by opening the WinLabEnCase image and selecting “Device -> Modify Time Zone Settings”.


image3.png


Question 5: How do you modify Time Zone Settings, show a screen shot below.


Now that you have the evidence added and the time zone set, you can analyze the evidence.

Timeline View

The Timeline view gives you a graphical overview of file creation, modification and access times and dates in a calendar view. It allows you to look for patterns.


Green Select the WinLabEnCase Image and click on the Timeline tab in the Views pane.


The timeline view can be zoomed from a yearly view to a minute-by-minute view using Higher Resolution button and Lower Resolution button.


The colored dots represent activity on a particular file. The legend for the colors can be found by clicking “Options” button from the top menu.


Question 6: Why is Timeline View useful for your investigation?


Gallery View

The Gallery view allows you to quickly see all the pictures in the case. Now let’s switch to the WinLabRaw image by View -> Evidence then open the WinLabRaw Image. Green select “WinLab Raw image”, in the Views pane, select the Gallery tab.


You will now see all of the pictures contained in the WinLabRaw Image. The Gallery view displays graphics files based on file extension.


Question 7: In the Raw Image, how many pictures are shown in Gallery View?


Process the Evidence (watch Processing Evidence Part 2 from http://www.encaseondemand.com/EnCasev7Essentials/tabid/2617/index.aspx)

Select Process Evidence… from the Add Evidence menu. Click the Process check box for the evidences that you intend to run through the Evidence Processor. The Evidence Processor Task list is shown at the bottom pane. You have the freedom to enable the tasks to run. For example, you may want to run certain tasks in the beginning, such as file signature and hash analysis, then later add other options, such as parsing compound files. However, you have to run certain tasks at a particular time. For example, you must run Recover Folders in the initial processing step. Tasks you must run in a specific step are marked with a red flag icon.


Note: If a task name is listed in a blue font, click on its task name to configure it. If a task name is listed in a black font, no further configuration is necessary


Select the WinLabRaw Image, enable the top five tasks and run the evidence processor.


image4.png


Recover folders.

Recover Folders will recover all deleted folders.


Note: For this image, you may not see anything interesting.


Question 8: Read the EnCase manual to find out how Recover-Folders recover deleted folders for FAT and NTFS file systems respectively?


File Signature Analysis

A file type (JPEG, Word Document, MP3 file) can be determined by the file’s extension and by a header that precedes the data in the file. If a file’s extension has been changed, then the only way to determine its type is by looking at its header.


Encase has a list of known file extensions and headers that it uses to identify files.


From the “View” menu select “File Types” to see the list of file types.


Question 9: What information is listed for each file type?


Question 10: What can an investigator do if the header of a file is unknown in your current setting of the EnCase?


When EnCase finished the file signature analysis. Select the WinLabRaw Image and take a look at the “Signature Analysis” and “Signature” Columns in the “Table” view.


Question 11: What different terms you see in the Signature Analysis column?


Question 12: Do you find any signature mismatch? List them.


Examine the WinLabRaw image in the gallery view again.


Question 13: Are there any graphics files on the WinLabRaw image whose file extensions have been changed? List them.


Question 14: If a file’s extension has been changed to a non-graphics file type (such as changing jpg to txt), will it be displayed in the Gallery view? If not, what could you do to fix this?


Hash Analysis

A hash is a digital fingerprint of a file or collection of data. EnCase uses the MD5 (and/or SHA1) algorithm to create hash(s) or “digital fingerprint” of a file.


The Evidence Processor’s Hash Analysis that we have run earlier has created the MD5 and SHA-1 hash values for the Raw image.


Check the “WinLabRaw Image” evidence in the table view, and make sure that the hash columns are filled.


Question 15: What are the types of files that will not have a hash generated?


Question 16: What are the three most common uses for hashes analysis?


Compound Files

Compound files are files with multiple layers and/or metadata such as Outlook Express email folders (.dbx), registry files, or OLE files.


In EnCase 7, you have several ways to expand the compound files. You can run the EnCase Evidence Processor on the EnCase image, select Expand compound files to expand all achieves and registry files OR you can expand the individual compound file.


Here we will try the second method by only expanding the individual compound file. Let’s look at the NTUSER.DAT registry file from WinLabEncase image.


View -> Evidence and click on WinLabEncase image,


In the Table view locate the file “Documents and Settings\PSMITH\NTUSER.DAT” and expand the EnCase image to find the “Documents and Settings\PSMITH\NTUSER.DAT” file by right click the file and choose Entries -> View File Structures. (Note: other registry files exist in C:\windows\system32\config folder. They are not included in this image.)


image5.png


Double click on NTUSER.DAT


Question 17: Did anything happen? Do you find any important information? If so, what kind of information you got?


Searching for Email (See Email from the EnCase V7 Essential webinar)

EnCase can search various types of email artifacts including Outlook (2000/2003), Outlook Express, Exchange, Lotus Notes, AOL and Thunderbird’s MBOX.


Select Process Evidence… from the Add Evidence menu. Select the WinLabEnCase image from the Evidence Process, and ONLY check Find Email (uncheck other tasks).


Double click on “Find Email” and check Search for Additional Lost or Deleted Items box for a search for deleted e-mails. Click OK to run the processor.


The processed e-mail will be found under the Records view.


image6.png


A list of processed e-mail archives will be displayed under the Email Folder. To open an e-mail archive, click on the hyperlink of the name of the archive


Question 18: What interesting information do you see from emails?


EnCase v7 also supports two forms of e-mail threading analysis, Conversations and Related messages.


Double click on Deleted Items.dbx. In the Records tab, from the Find related items menu, click Show related messages button.


image7.png


Question 19: Read EnCase Forenscis V7 User Guide (page 208), briefly describe what are these features.


Question 20: Under the Records view, you should also see Thumbnails under WinLabRaw Image, what are thumbnails? List three of them.


Searching for Internet Artifacts (Processed Evidence Results Part 2)

Internet history contains rich evidences. EnCase will collect Internet-related artifacts, such as browser histories and cached web pages. You also have the option to search unallocated space for the Internet


artifacts.


Select Process Evidence… from the Add Evidence menu. Select the WinLabEnCase image from the Evidence Process, and check Find internet artifacts. Double click the Find internet artifacts hyperlink and choose “search unallocated space for internet artifacts” and run the processor.


The processed internet artifacts will be found under the Records view. Select the Internet folder of Records and then click on the Internet hyperlink.


Question 21: What kind of information do you see in the record for Internet?


Question 22: How does “search unallocated space for internet artifacts” affect your search results in the record?


Searching in EnCase v7


There are three principal methods of searching through evidence in EnCase v7:


· Index searches – Evidence data is indexed prior to searching


· Raw searches – Searches based on non-indexed, raw data


· Tag searches – Searches based on user-defined tags


Generating an index can take time, however, the trade-off in time spent creating the index yields a greater payoff with near instantaneous search times.


Using EnCase indexing search (Viewing Index and Search Results Part 1)

Text indexing allows you to quickly query the transcript of entries. Creating an index builds a list of words from the contents of an evidence file that contain pointers to their occurrence in the file. Two steps are involved in using the index: Generating an index and Searching an Index.


Select Process Evidence… from the Add Evidence menu. Select the WinLabEnCase image from the Evidence Process, and check “Index Text And MetaData” and only set index slack and Unallocated, then click OK to run the processor.


To search an index, first open the search tab by clicking “View” -> Search, then click on Index button.


Type “search” in the index space and hit the run button (a green arrow at the same line of the Index button). The search result is shown in the table view. You can read the file by right-click on the tile and choose Go to file, then view the content at the low pane by choose text, Doc, Transcript or Picture depending on the file type.


Question 23: What are the results? List 2 files that contain the term “search” in their contents.


Searching for Keywords

This option runs a raw keyword search during the processing. You can either use Evidence Process Search for Keywords before analysis or the Raw Keyword search function outside the Evidence Processor during analysis. Let’s try the keyword search outside the Evidence Processor.


Click “View” -> “Evidence”, then click Raw Search All top-down menu and choose New Raw Search All…


image8.png


Use “New” to add a single keyword, “microsoft” (no quotes). Under Search Option, add the Unicode in addition to the default ANSI Latin-1


If you have multiple keywords to add at once, you can use “Add Keyword List” to add them.


Now use “Add Keyword List” to add in the following keywords:


computer


this


Again, under Search Option, add the Unicode in addition to the default ANSI Latin-1


Choose “Search entry slack” from the top checkboxes.


Questions 24: What are the other search options besides “Search entry slack”?


Click “Run…” under Raw Search All


When the search is done, to view the search results, let’s go to the View keywords hits (the yellow key symbol) sub-tab of Search tab. image9.png


In the keywords tree pane, we will see all the keywords we created. To see the result of any keyword, simply click on the keyword.


Question 25: What do you see from Search Hits? List two files from the search hits.


Bookmarks and Tags

Bookmarks allow you to mark folders, files, search results, or parts of a file for later reference and for inclusion in reports.


Bookmarking in Evidence View


Go to the “WinLabRaw Image” evidence, click on the “Gallery”, blue-check the additional images that you identified after “Signature Analysis”. Use the Bookmark drop-down menu to create bookmarks for the selected entry (or entries) by selecting Single item…. Or Selected items… (for multiple entries). Place the evidence bookmarks in the appropriate folder of your case report template or you can create a new folder.


image10.png


To view the bookmarking you created: “view” -> Bookmarks


Action 26: Include a screenshot of the bookmarks you created in the Bookmarks tab.


Tags


The EnCase v7 tagging feature allows you to mark evidence items from Records, Evidence, or Bookmarks for review. You can use the default tags created by EnCase or define your own tags. Tags tab can be found from the Records, Evidence, or Bookmark tabs,


Let’s create a tag and then tag the two files from your keyword search exercise using this tag.


Go to the evidence that contains these two suspicious files. Click “Tags” -> Manage tags…. , then create a tag named Suspicious Files, displayed as “Files” in Red color (right-click the Background Color and choose edit).


Select and blue check these two suspicious files, then use “Tags -> Tag selected items…” to tag them using the “Files” tag. The tag should be shown in the Table view of the “Tag” column.


Action 27: Show the tagged Files in the Table view.


Question 28: What is the “One-click tagging” feature (see EnCase User Guide, page 234)?


Action 29: Finally, go back Process Evidence… from the Add Evidence menu. Selected the WinlabEnCase image, expend Modules, and choose one function from Modules and include your results below.


PAGE


1


Advanced Computer Forensics - EnCase


Applied Sciences

Architecture and Design

Biology

Business & Finance

Chemistry

Computer Science

Geography

Geology

Education

Engineering

English

Environmental science

Spanish

Government

History

Human Resource Management

Information Systems

Law

Literature

Mathematics

Nursing

Physics

Political Science

Psychology

Reading

Science

Social Science

Home

Blog

Archive

Contact

google+twitterfacebook

Copyright © 2019 HomeworkMarket.com

Homework is Completed By:

Writer Writer Name Amount Client Comments & Rating
Instant Homework Helper

ONLINE

Instant Homework Helper

$36

She helped me in last minute in a very reasonable price. She is a lifesaver, I got A+ grade in my homework, I will surely hire her again for my next assignments, Thumbs Up!

Order & Get This Solution Within 3 Hours in $25/Page

Custom Original Solution And Get A+ Grades

  • 100% Plagiarism Free
  • Proper APA/MLA/Harvard Referencing
  • Delivery in 3 Hours After Placing Order
  • Free Turnitin Report
  • Unlimited Revisions
  • Privacy Guaranteed

Order & Get This Solution Within 6 Hours in $20/Page

Custom Original Solution And Get A+ Grades

  • 100% Plagiarism Free
  • Proper APA/MLA/Harvard Referencing
  • Delivery in 6 Hours After Placing Order
  • Free Turnitin Report
  • Unlimited Revisions
  • Privacy Guaranteed

Order & Get This Solution Within 12 Hours in $15/Page

Custom Original Solution And Get A+ Grades

  • 100% Plagiarism Free
  • Proper APA/MLA/Harvard Referencing
  • Delivery in 12 Hours After Placing Order
  • Free Turnitin Report
  • Unlimited Revisions
  • Privacy Guaranteed

6 writers have sent their proposals to do this homework:

Homework Guru
University Coursework Help
Helping Hand
Top Essay Tutor
Writer Writer Name Offer Chat
Homework Guru

ONLINE

Homework Guru

Hi dear, I am ready to do your homework in a reasonable price and in a timely manner.

$232 Chat With Writer
University Coursework Help

ONLINE

University Coursework Help

Hi dear, I am ready to do your homework in a reasonable price.

$232 Chat With Writer
Helping Hand

ONLINE

Helping Hand

I am an Academic writer with 10 years of experience. As an Academic writer, my aim is to generate unique content without Plagiarism as per the client’s requirements.

$230 Chat With Writer
Top Essay Tutor

ONLINE

Top Essay Tutor

I have more than 12 years of experience in managing online classes, exams, and quizzes on different websites like; Connect, McGraw-Hill, and Blackboard. I always provide a guarantee to my clients for their grades.

$235 Chat With Writer

Let our expert academic writers to help you in achieving a+ grades in your homework, assignment, quiz or exam.

Similar Homework Questions

How does atar scaling work wace - Bsc subjects part 1 - Official beer pong rules - Advanced issues in risk management - Lost at sea activity - Bangladesh flood 1998 causes - Hydrogen peroxide half equation - T5-DQ2 HEALTH INSURANCE CREDIT RATINGS - Reflection - Sas data step keep - How to calculate 1st quartile in excel - The death of ivan ilyich discussion questions - Royal mail world zones - Chapter 2 business ethics and social responsibility ferrell - Big bang theory chicken pecking for corn - Alice in wonderland monologue - Air fuel ratio chart - Williams institute ethics awareness inventory - Itec and bioterrorism - Usf cybersecurity flowchart - 1 mole of aluminum - MBA - Main - Activity 8 -1 - Apc back-ups es 700 beeping - Cisco prime ordering guide - Smiths fuel gauge wiring diagram - Drag me to hell opening scene - Fm modulation and demodulation matlab code - Rapper with a clock necklace informally - Symmetric multiprocessing and asymmetric multiprocessing - The apprenticeship of duddy kravitz quotes - Emerging threats - MOS 5101 Case Study Due today by 1000pm CST plagiarism free - Big data - N4455 professional development plan - Case on fair and lovely - Layunin ng lipunan kabutihang panlahat - I need a case study on how would Parse’s theory focuses on quality of life - Capital Punishment - Tlmt 601 - Christoph lengauer henrietta lacks - Bobcat code 9 21 - Modern liberal arts winchester - Acsm curl up test - Financial management final exam multiple choice - Week -5 reserach paper 832 - How to calibrate an eyepiece graticule - Siemens power engineering guide - Project management simulation scope resources and schedule solution - Respect the interdependence of creation - Dramatic meaning in drama - Commonwealth protective security manual - Court Case #96303809Law - Lola log on louisiana - Market research document crossword clue - Allison has 5 times as many baseball - Dave andrews radio leicester - Week7 6053 - Executive compensation at general electric case analysis - Okie from the stokie - Angle of attack display - Co chair roles and responsibilities - South texas college simnet - 9/11 - Dr bret scher wikipedia - Needs Assessments - Cet cette ce ces - Irony in the interlopers - Health Care Model Infographic - Animal body plans worksheet - Musical fountain in china with audio of bhagavad gita - Incomplete combustion chemical equation - Alice j and bruce m byrd - Perdue farms case study - What features distinguish bryophytes from other plants - What happens when you put alka seltzer in water - Cindy jackson barbie doll - They say i say introduction template - How are fossil fuels used to generate electricity - Which of the following comparisons best isolates the impact of a change in activity on performance? - The Professional and Ethical Demeanor I Will Display - Swarovski crystal size chart - Summary - Long reef surf life saving club - Christ freeze dryer manual - Ethics in Accounting - Week 3 - Red white and royal blue pdf - The book thief part 3 questions - Hunter rain clik gutter mount - Archer daniels midland and the friendly competitors case study - Kddm - Apa 7 lab report format - Describe a room in your house - Gibbs learning by doing - Tweeter etc case analysis - Lift every voice and sing powerpoint - 2 what do your results indicate about cell cycle control - Discussion 5 - Managerial Accounting - Nucor corporation in 2014 case study - Managing employee benefits ppt