Assignment 6
Forensics
Computer Forensics (Motivation)
Computer Forensics (Your Tasks)
Disclaimers
Everything for this assignment should be done on your local/virtual machine.
Do not access any machines or images without express permission (this is covered by the privacy laws we discussed in lecture).
Do not perform any network or remote analysis; it is out of scope and unnecessary for this assignment.
Assignment Submission
At Least 1 Password
6 of 8 Total Two-Word Tokens
3 of 4 Total Three-Word Tokens
2 of 3 Total Four-Word Tokens or Transaction Identifier
Dead and Live Analysis
Dead Analysis
Live Analysis
Dead and Live Analysis (trite examples)
Dead Analysis
Live Analysis
Password-based Key Derivation Functions
Unix File System
General locations:
Location | Description |
/ | Root directory |
/dev | Attached devices and pseudo-devices |
/home/mike | Mike’s home directory |
/mnt, /media | For mounting, managing, attaching removable devices, filesystems etc |
/var/log | System, process log files |
/tmp | Temporary files |
/etc | Contains system-wide configuration files |
Unix File System
`ls` without the -l flag [hidden files and folders not shown]
Unix File System
`ls` with the -la flag [hidden files and folders shown]
GNU Grub
Bootloader program used by most Linux operating systems
Presents a list of the operating systems available on disk
Access by hitting ‘Esc’ during boot
GNU Grub
/etc/rc.local is a script that is run when the operating system first loads
Partitions
Partitions separate a physical storage medium into logically isolated sections
Linux Unified Key Setup (LUKS) - Disk Encryption
Linux User Account Passwords
Background: Linux Accounts and Access Control
Account Security is enforced by the operating system
Passwords are stored as hashes in a permissions-protected /etc/shadow
Communication Traces
Look for traces of various digital communication:
PGP/GPG
“Pretty Good Privacy” / “GNU Privacy Guard”
Bitcoin tools
Wallet Key Pair (not a PGP/GPG key pair)
Wallet Software
Questions?