change tools

This commit is contained in:
Frank Xu
2021-01-19 16:32:12 -05:00
parent f038847823
commit 4bab1a7d0e

138
README.md
View File

@@ -3,108 +3,122 @@
<img src="https://upload.wikimedia.org/wikipedia/commons/3/3c/BJA_Logo.png" width="150">
### Features of hands-on labs
===================
- Hands-on Digital Forensics Labs: designed for Students and Faculty
- Linux-based lab: All labs are purely based on [Kali Linux](https://www.kali.org/downloads/)
- Lab screenshots: Each lab has a PPT with lab screenshots
- Comprehensive: Cover many topics in digital forensics
- Free: All tools are open source
- Updated: The project is funded by DOJ and will keep updating
- Updated: The project is funded by DOJ and will keep updating
---
## Table of Contents (updating)
## Table of Contents (updating)
- Case Study
* [Investigating NIST Data Leakage](#Investigating-NIST-Data-Leakage)
* [Investigating Illegal Possession of Images](#Investigating-Illegal-Possession-of-Images)
* [Investigating Email Harassment](#Investigating-Email-Harassment)
- [Investigating NIST Data Leakage](#Investigating-NIST-Data-Leakage)
- [Investigating Illegal Possession of Images](#Investigating-Illegal-Possession-of-Images)
- [Investigating Email Harassment](#Investigating-Email-Harassment)
- [Tools Used](#Tools-Used)
---
### Investigate NIST Data Leakage
==============
The case study is to investigate an image involving intellectual property theft. The study include
The case study is to investigate an image involving intellectual property theft. The study include
* A large and complex case study created by NIST. You can access the [Senario, DD/Encase images](https://www.cfreds.nist.gov/data_leakage_case/data-leakage-case.html). You can also find the [solutions](https://www.cfreds.nist.gov/data_leakage_case/leakage-answers.pdf) on their website.
* 13 hands-on labs/topics in digital forensics
- A large and complex case study created by NIST. You can access the [Senario, DD/Encase images](https://www.cfreds.nist.gov/data_leakage_case/data-leakage-case.html). You can also find the [solutions](https://www.cfreds.nist.gov/data_leakage_case/leakage-answers.pdf) on their website.
- 13 hands-on labs/topics in digital forensics
**Topics Covered**
| Labs | Topics Covered |Size of PPTs |
| --- | ----------- |----------- |
| Lab 0 | Environment Setting Up | 2M |
| Lab 1 | Windows Registry | 3M |
| Lab 2 | Windows Event and XML |3M |
| Lab 3 | Web History and SQL | 3M|
| Lab 4 | Email Investigation |3M |
| Lab 5 | File Change History and USN Journal |2M |
| Lab 6 | Network Evidence and shellbag |2M |
| Lab 7 | Network Drive and Windows shellbag |5M |
| Lab 8 | Master File Table ($MFT) Analysis |4M |
| Lab 9 | Windows Search History | 4M|
| Lab 10 | Windows Volume Shadow Copy Analysis |6M |
| Lab 11 | Data Carving |3M |
| Lab 12 | Crack Windows Passwords | 2M|
| Labs | Topics Covered | Size of PPTs |
| ------ | ----------------------------------- | ------------ |
| Lab 0 | Environment Setting Up | 2M |
| Lab 1 | Windows Registry | 3M |
| Lab 2 | Windows Event and XML | 3M |
| Lab 3 | Web History and SQL | 3M |
| Lab 4 | Email Investigation | 3M |
| Lab 5 | File Change History and USN Journal | 2M |
| Lab 6 | Network Evidence and shellbag | 2M |
| Lab 7 | Network Drive and Windows shellbag | 5M |
| Lab 8 | Master File Table ($MFT) Analysis | 4M |
| Lab 9 | Windows Search History | 4M |
| Lab 10 | Windows Volume Shadow Copy Analysis | 6M |
| Lab 11 | Data Carving | 3M |
| Lab 12 | Crack Windows Passwords | 2M |
---
### Investigating Illegal Possession of Images
=====================
The case study is to investigate the illegal possession of Rhino images. This image was contributed by Dr. Golden G. Richard III, and was originally used in the DFRWS 2005 RODEO CHALLENGE. NIST hosts the [USB DD image](https://www.cfreds.nist.gov/dfrws/Rhino_Hunt.html). A copy of the image is also available in the repository.
**Topics Covered**
| Labs | Topics Covered |Size of PPTs |
| --- | ----------- |----------- |
| Lab 0 | HTTP Analysis using Wireshark (text) | 3M |
| Lab 1 | HTTP Analysis using Wireshark (image) | 6M |
| Lab 2 | The Sleuth Kid Tutorial | 1M |
| Lab 3 | Rhion Possession Investigation 1: File recovering |9M |
| Lab 4 | Rhion Possession Investigation 2: Steganography | 4M|
| Lab 5 | Rhion Possession Investigation 3: Extract Evidence from FTP Traffic |3M |
| Lab 6 | Rhion Possession Investigation 4: Extract Evidence from HTTP Traffic |5M |
| Labs | Topics Covered | Size of PPTs |
| ----- | -------------------------------------------------------------------- | ------------ |
| Lab 0 | HTTP Analysis using Wireshark (text) | 3M |
| Lab 1 | HTTP Analysis using Wireshark (image) | 6M |
| Lab 2 | The Sleuth Kid Tutorial | 1M |
| Lab 3 | Rhion Possession Investigation 1: File recovering | 9M |
| Lab 4 | Rhion Possession Investigation 2: Steganography | 4M |
| Lab 5 | Rhion Possession Investigation 3: Extract Evidence from FTP Traffic | 3M |
| Lab 6 | Rhion Possession Investigation 4: Extract Evidence from HTTP Traffic | 5M |
### Investigating Email Harassment
=========
The case study is to investigate the harassment email sent by a student to a faculty member. The case is hosted by digitalcorpora.org. You can access the [senario description](https://digitalcorpora.org/corpora/scenarios/nitroba-university-harassment-scenario) and [network traffic](http://downloads.digitalcorpora.org/corpora/scenarios/2008-nitroba/nitroba.pcap) from their website. The repository only provides lab instructions.
The case study is to investigate the harassment email sent by a student to a faculty member. The case is hosted by digitalcorpora.org. You can access the [senario description](https://digitalcorpora.org/corpora/scenarios/nitroba-university-harassment-scenario) and [network traffic](http://downloads.digitalcorpora.org/corpora/scenarios/2008-nitroba/nitroba.pcap) from their website. The repository only provides lab instructions.
**Topics Covered**
| Labs | Topics Covered |Size of PPTs |
| --- | ----------- |----------- |
| Lab 0 | Investigating Harassment Email using Wireshark | 3M |
| Lab 1 | t-shark Forensic Introduction | 2M |
| Lab 2 | Investigating Harassment Email using t-shark | 2M |
| Labs | Topics Covered | Size of PPTs |
| ----- | ---------------------------------------------- | ------------ |
| Lab 0 | Investigating Harassment Email using Wireshark | 3M |
| Lab 1 | t-shark Forensic Introduction | 2M |
| Lab 2 | Investigating Harassment Email using t-shark | 2M |
---
### Tools Used
========
* Wine
* https://github.com/AtesComp/Vinetto
* https://github.com/Arthelon/imgclip
* Tree (apt-get install tree)
* https://github.com/keydet89/RegRipper3.0
* https://github.com/PoorBillionaire/Windows-Prefetch-Parser.git
* apt-get install python3-evtx
* apt-get install xmlstarlet
* apt-get install libhivex-bin
* apt-get install libesedb-utils
* apt-get install pasco
* https://github.com/libyal/libpff apt-get install pff-tools
* pip install usncarve
* pip install usnparser
* JLECmd wget https://f001.backblazeb2.com/file/EricZimmermanTools/JLECmd.zip
* apt-get install liblink-tuils
* https://github.com/digitalsleuth/time_decode
* pip install analyzeMFT
* https://github.com/libyal/libvshadow
* https://github.com/prolsen/recentfilecache-parser
| Name | version | vendor | Installation |
| ----------------------- | ---------- | --------------------------------------------------------------- | ------------------------------ |
| Wine | 6.0 | https://source.winehq.org/git/wine.git/ | |
| Vinetto | 0.98 | https://github.com/AtesComp/Vinetto | |
| imgclip | 05.12.2017 | https://github.com/Arthelon/imgclip | |
| Tree | 06.01.2020 | https://github.com/kddeisz/tree | apt-get install tree |
| RegRipper | 3.0 | https://github.com/keydet89/RegRipper3.0 | |
| Windows-Prefetch-Parser | 05.01.2016 | https://github.com/PoorBillionaire/Windows-Prefetch-Parser.git | |
| python-evtx | 05.21.2020 | https://github.com/williballenthin/python-evtx | apt-get install python3-evtx |
| xmlstarlet | 1.6.1 | https://github.com/fishjam/xmlstarlet | apt-get install xmlstarlet |
| hivex | 09.15.2020 | https://github.com/libguestfs/hivex | apt-get install libhivex-bin |
| libesedb | 01.01.2021 | https://github.com/libyal/libesedb | apt-get install libesedb-utils |
| pasco-project | 02.09.2017 | https://annsli.github.io/pasco-project/ | apt-get install pasco |
| libpff | 01.17.2021 | https://github.com/libyal/libpff | apt-get install pff-tools |
| USN-Record-Carver | 05.21.2017 | https://github.com/PoorBillionaire/USN-Record-Carver | pip install usncarve |
| USN-Journal-Parser | 1212.2018 | https://github.com/PoorBillionaire/USN-Journal-Parser | pip install usnparser |
| JLECmd | 1.4.0.0 | https://f001.backblazeb2.com/file/EricZimmermanTools/JLECmd.zip | |
| libnl-utils | 3.2.27 | https://packages.ubuntu.com/xenial/libs/libnl-utils | apt-get install libnl-utils |
| time_decode | 12.13.2020 | https://github.com/digitalsleuth/time_decode | pip3 install time-decode |
| analyzeMFT | 2.0.4 | https://github.com/dkovar/analyzeMFT | pip install analyzeMFT |
| libvshadow | 12.20.2020 | https://github.com/libyal/libvshadow | |
| recentfilecache-parser | 02.13.2018 | https://github.com/prolsen/recentfilecache-parser | |
## Contribution
=============
* Frank Xu
* Malcolm Hayward
* Richard (Max) Wheeless
- Frank Xu
- Malcolm Hayward
- Richard (Max) Wheeless