Question #5. ---------------------------------------- Forensics Report - Recovered Floppy Disk Investigator - Ramece Cave ---------------------------------------- The analysis is done on a PII 300 with 128MB RAM, running Slackware 8.0 TASK is used to perform the initial analysis. TASK is a modified version of TCT enhanced to incorporate windows filesystems. TCT has options for usage with FAT; but support is unstable. TCT was originally used during the begining of the investigation, moved to TASK after recieving several magic number errors in association of no support for FAT file systems. During the investigation I will provide various methods for confirmation of reported findings (if available). Prompt and directory listings have been truncated for clarity. Information from the Police Report was used to begin the investigation. **This page will be updated shortly with an analysis for recovering the corrupted zip file.**
Directory Structure sotm -- main directory images -- disk image files deleted-files -- recovered files disk-files -- original disk contents findings -- strings or output files notes -- investigation notes reports -- provided information, html documents Software used: Analysis The Coroner's Toolkit TASK StegDetect Data Recovery fatback foremost ZipFix jpeg-recover 1. Verifed MD5 Sum for 'image.zip' obtained from http://www.honeynet.org, 'md5sum' is used to verify sums. Reported MD5 Sum: image.zip MD5 = b676147f63923e1f428131d59b1d6a72 ( image.zip ) Actual MD5 Sum: b676147f63923e1f428131d59b1d6a72 image.zip After unziping the file renamed 'image' to 'floppy_image', verified original image still intact. ac3f7b85816165957cd4867e62cf452b floppy_image ac3f7b85816165957cd4867e62cf452b image Beginning Inestigation 2. Determining operating system associated with disk image. Method #1 fsstat -f /images/floppy_image FILE SYSTEM INFORMATION -------------------------------------------- File System Type: FAT OEM: MS DOS5.0 Volume ID: 3299986895 Volume Label: NO NAME File System Type (super block): FAT12 META-DATA INFORMATION -------------------------------------------- Inode Range: 2 - 45762 Root Inode: 2 CONTENT-DATA INFORMATION -------------------------------------------- Sector Size: 512 Cluster Size: 512 Sector of First Cluster: 33 Total Sector Range: 0 - 2878 FAT 0 Range: 1 - 9 FAT 1 Range: 10 - 18 Data Area Sector Range: 19 - 2878 FAT CONTENTS (in sectors) -------------------------------------------- 73-103 (31) -> EOF 104-108 (5) -> EOF Method #2 dcat -s -f fat /images/floppy_image 512: Size of Addressable Unit 512: File Block Size 1: Num Frags FAT file systems use 512 byte cluster sizes for storage. Image confirmed FAT, associated with windows based operating system. 3. Used loopback devices to mount the image locally losetup /dev/loop0 floppy_image mount /dev/loop0 /mnt List Output root@mindfk/mnt#: ls -l total 17 -rwxr-xr-x 1 root root 15585 Sep 11 08:30 cover\ page.jpgc\ \ \ \ \ \ \ \ \ \ \ * -rwxr-xr-x 1 root root 1000 May 24 08:20 schedu~1.exe* root@mindfk/mnt#: 4. Running floppy_image though strings to parse any viable data. strings -o floppy_image > floppy_image-strings (Used -o to include decimal offset) After viewing the file, there is traces of data on the disk, beyond the two files listed originally. grep pass findings/floppy_image-strings 0020148 I emailed you the schedule that I am using. I think it helps me cover myself and not be predictive. Tell me what you think. To open it, use the same password that you sent me before with that file. Talk to you later. 5. Extracting unallocated disk space (slack) dls -f fat /images/floppy_image /findings/floppy_image.dls 6. Extracting all ASCII data from unallocated space strings -o /findings/floppy_image.dls > /findings/floppy_image.dls NOTE: There are noted changes in the findings based on the file size and md5sum. The disk image contains recoverable data. 6dc12d4ce2035de9bc52bc52e05edca4 floppy_image-strings ffe8591dcdde959e4ae3c3ab4b05458a floppy_image.dls.str root@mindfk/findings#: ls -l -rw-r--r-- 1 root root 4230 Oct 9 09:01 floppy_image-strings -rw-r--r-- 1 root root 1675 Oct 9 09:23 floppy_image.dls.str root@mindfk/findings#: All "interesting" portions of the strings file are in bold floppy_image-strings 7. Looking for any file contents on the image. Method #1 fls -f fat /images/floppy_image r/r * 5: Jimmy Jungle.doc (_IMMYJ~1.DOC) r/r 8: cover page.jpgc (COVERP~1.JPG) r/r 11: Scheduled Visits.exe (SCHEDU~1.EXE) Three files were located in the image any deleted documents are marked with an *. The inodes for the files are also specified. Method #2 ffind -f fat -d /images/floppy_image 5 * /Jimmy Jungle.doc (_IMMYJ~1.DOC) ffind -f fat -d /images/floppy_image 8 -ORPHAN_FILE-/COVERP~1.JPG ffind -f fat -d /images/floppy_image 11 -ORPHAN_FILE-/SCHEDU~1.EXE Ffind confirmed the files based on the inodes. 8. Extracting files based on the inodes icat -f fat /images/floppy_image 5 > /deleted-files/_IMMYJ~1.DOC-recover icat -f fat /images/floppy_image 8 > /deleted-files/COVERP~1.JPG-recover icat -f fat /images/floppy_image 11 > /deleted-files/SCHEDU~1.EXE-recover file /deleted-files/* /deleted-files/COVERP~1.JPG-recover: PC formatted floppy with no filesystem /deleted-files/SCHEDU~1.EXE-recover: Zip archive data, at least v2.0 to extract /deleted-files/_IMMYJ~1.DOC-recover: Microsoft Word document data 9. Recovering deleted files using 'fatback' for the doc and 'foremost' for the jpg. fatback /dev/loop0 -o /deleted-files/ No audit log specified, using "./fatback.log" Parsing file system. / (Done) fatback> ls Sun Apr 15 14:42:30 2002 20480 ?IMMYJ~1.DOC Jimmy Jungle.doc Sun Sep 11 08:30:52 2002 15585 COVERP~1.JPG cover page.jpgc Sun May 24 08:20:32 2002 1000 SCHEDU~1.EXE Scheduled Visits.exe fatback> copy ?IMMYJ~1.DOC /root/sotm/deleted-files fatback> copy COVERP~1.JPG /root/sotm/deleted-files fatbaok> copy SCHEDU~1.EXE /root/sotm/deleted-files fatback> quit fatback.log: fatback> copy ?IMMYJ~1.DOC /root/sotm/deleted-files Extracting cluster chain 2 to file /root/sotm/deleted-files/Jimmy Jungle.doc "/root/sotm/deleted-files/Jimmy Jungle.doc": Unable to recover file entirely, carving instead. fatback> copy COVERP~1.JPG /root/sotm/deleted-files Extracting cluster chain 420 to file /root/sotm/deleted-files/cover page.jpgc "/root/sotm/deleted-files/cover page.jpgc ": Unable to recover file entirely, carving instead. fatback> copy SCHEDU~1.EXE /root/sotm/deleted-files Extracting cluster chain 73 to file /root/sotm/deleted-files/Scheduled Visits.exe fatback> quit Link to recovered doc file Jimmy Jungle.doc root@mindfk~/deleted-files#: ls -l total 52 -rw-r--r-- 1 root root 20480 Oct 9 22:46 Jimmy\ Jungle.doc -rw-r--r-- 1 root root 1000 Oct 9 22:48 Scheduled\ Visits.exe\ \ \ \ \ \ -rw-r--r-- 1 root root 15585 Oct 9 22:47 cover\ page.jpgc\ \ \ \ \ \ \ \ \ \ \ root@mindfk~/deleted-files#: 'foremost' recovered a jpg and doc file from the image foremost -o /deleted-files /images/floppy_image foremost version 0.60 Written by Kris Kendall and Jesse Kornblum. Using output directory: /deleted-files Using configuration file: foremost.conf Opening /root/sotm/images/floppy_image. /images/floppy_image: 100.0% done (1.4 MB read) foremost audit log: Foremost version 0.60 audit file Started at Wed Oct 9 23:23:11 2002 with commandline: foremost -o /root/sotm/deleted-files /root/sotm/images/floppy_image Using output directory: /root/sotm/deleted-files File Found at Byte Length Extracted From 00000001.doc 16896 100000 /root/sotm/images/floppy_image 00000002.jpg 37376 8754 /root/sotm/images/floppy_image Completed at Wed Oct 9 23:23:12 2002 Link to recovered JPEG File cover page.jpg Alternate JPEG Analysis schedul~1.exe is a ZIP file: 10. Zipfix was used to recover and repair the file. Zipfix was unable to recover the file because it is corrupt. The recovered file is named "Scheduled Visits.xls". Pictures of the zip recover process: schedu~1.exe The password to the file is goodtimes