2021-01-13 21:41:49 -05:00
2021-01-13 21:21:37 -05:00
2021-01-10 19:28:10 -05:00
2021-01-13 20:57:44 -05:00
2021-01-10 19:48:04 -05:00
2021-01-13 21:41:49 -05:00

Digital Forensics Lab

Features of hands-on lab

===================

  • Hands-on Digital Forensics Labs: Designed for Students and Faculty
  • Each lab has a PPT with lab screenshots
  • Purely based on Linux: Using Kali Linux
  • Comprehansive: Cover many topics in digial forensics
  • Free: All tools are open source
  • Upated: The project is funded by DOJ and NSF and will keep updating

Table of Contents (updating)


NIST Data Leakage

==============

The case study is to investigate an image involving intellectual property theft. The study include

  • A large and complex image created by NIST
  • 13 hands-on labs/topics in digital forensics

Topics Covered

Labs Topics Covered Size of PPTs
Lab 0 Environment Setting Up 2M
Lab 1 Windows Registry 3M
Lab 2 Windows Event and XML 3M
Lab 3 Web History and SQL 3M
Lab 4 Email Investigation 3M
Lab 5 File Change History and USN Journal 2M
Lab 6 Network Evidence and shellbag 2M
Lab 7 Network Drive and Windows shellbag 5M
Lab 8 Master File Table ($MFT) Analysis 4M
Lab 9 Windows Search History 4M
Lab 10 Windows Volume Shadow Copy Analysis 6M
Lab 11 Data Carving 3M
Lab 12 Crack Windows Passwords 2M

Illegel Possesion of Images

=====================

The case study is to investigate the illegel possession of Rhino images. This image was contributed by Dr. Golden G. Richard III, and was originally used in the DFRWS 2005 RODEO CHALLENGE. NIST hosts the USB DD image. The copy of the image is also available in the repository.

Topics Covered

Labs Topics Covered Size of PPTs
Lab 0 HTTP Analysis using Wireshark (text) 3M
Lab 1 HTTP Analysis using Wireshark (image) 6M
Lab 2 The Sleuth Kid Tutorial 1M
Lab 3 Rhion Possesion Investigation 1: File recovering 9M
Lab 4 Rhion Possesion Investigation 2: Steganography 4M
Lab 5 Rhion Possesion Investigation 3: Extract Evidence from FTP Traffic 3M
Lab 6 Rhion Possesion Investigation 3: Extract Evidence from HTTP Traffic 5M

Email Harassment

=========

The case study is to investigate the harassment email sent by a student to a faculty member. The case is hosted by digitalcorpora.org. You can access the senario description and network traffic from their website. The repository only provides lab instructions.

Topics Covered

Labs Topics Covered Size of PPTs
Lab 0 Investigating Harassment Email using Wireshark 3M
Lab 1 t-shark Forensic Introduction 2M
Lab 2 Investigating Harassment Email using t-shark 2M

Tools Used

========

Contribution

=============

  • Frank Xu
  • Malcolm Hayward
  • Richard (Max) Wheeless
Languages
Jupyter Notebook 38.1%
Roff 32.5%
HTML 16.6%
Python 3.1%
Rich Text Format 2.3%
Other 7.4%