Forensics
Lab
experiment
Task1_Recovering
jpeg
file
In
this
experiment
you
are
going
to
use
a
BackTrack
tool
called
recoverjpeg.
To
recover
deleted
JPEG
files
on
a
USB
stick.
Under
Applications
choose:
o BackTrackForensicsForensics
Carving
Toolsrecoverjpeg
Now
you
need
to
create
a
directory
to
store
the
recovered
files
in
it.
For
this
experiment
we
are
going
to
create
a
directory
named
JPEG
(or
any
name
you
prefer)
on
the
Desktop.
Change
your
directory
to
Desktop
o root@bt:~#cd
Desktop
Make
a
new
directory:
o root@bt:~/Desktop#mkdir
JPEG
Change
your
directory
to
JPEG
o root@bt:~/Desktop#cd
JPEG
o root@bt:~/Desktop/JPEG#
recoverjpeg
command
to
extract
the
files
to
JPEG
directory.
But
before
issuing
this
command
you
need
to
know
the
path
to
your
USB
stick.
To
find
out
use
fdisk
command:
o root@bt:~/Desktop/JPEG#fdisk
l
From
the
output
find
out
the
path
then
use
recoverjpeg
command
o root@bt:~/Desktop/JPEG#recoverjpeg
/dev/sdb1
It
might
take
sometimes
to
recover
all
the
files.
You
also
might
be
able
to
retrieve
the
files
from
formatted
USB
stick.
Open
JEPG
and
check
the
recovered
files.
This
tool
is
only
capable
of
recovering
.jpg
files
and
not
other
image
formats
like
.png.
Save
the
files
and
attach
them
to
your
report.
Task2_
create
an
MD5
of
text
file
alter
it
and
compare
In
this
experiment
you
are
going
to
use
a
BackTrack
tool
called
hashdeep,
to
compare
the
hash
values
before
and
after
altering
a
text
file.
Run
hasdeep
from
ApplicationsBackTrackForensicsForensic
Hashing
Toolshashdeep
Create
a
text
file
on
the
Desktop
called
[Link]
type
something
in
this
text
file
and
save
it
Create
a
hash
file
from
[Link]
and
save
it
in
a
file
called
[Link].
To
do
this
issue
the
command
below
in
hashdeep
terminal:
o root@bt:~#hashdeep
e
/root/Desktop/[Link]
>
/root/Desktop/[Link]
If
you
open
up
[Link]
you
can
see
the
created
hash
values.
Now
open
[Link]
and
change
some
words
or
letters
in
it.
Create
a
hash
again
and
store
it
in
[Link]
o root@bt:~#hashdeep
e
/root/Desktop/[Link]
>
/root/Desktop/[Link]
Compare
the
values
in
HASHES1
and
HASHES2.
Are
they
same?
Save
hash
files
and
[Link]
before
and
after
altering
for
your
report.
Task3_
Missidentify
In
this
experiment
you
are
going
to
use
a
tool
in
BackTrack
called
missidentify.
This
tool
searches
a
Windows
hard
drive
(or
in
our
case
USB
stick)
and
finds
the
entire
Windows
executable
files
even
if
they
are
hidden
or
renamed
and
lists
them.
Run
missidentify
from:
ApplicationsBackTrackForensicsForensic
Analysis
Toolsmissidentify
Mount
the
Windows
hard
drive
Find
the
path
to
your
hard
disk
or
USB
stick
o root@bt:~#fdisk
-l
o E.G
/dev/sdb1
you
need
to
mount
the
Hard
disk
or
USB
stick
Mounting
USB
stick:
o root@bt:~#cd
/mnt/
o root@bt:~#mkdir
usbflash
o root@bt:~#mount
/dev/sdb1
/mnt/usbflash
Issue
the
command
below
to
save
the
file
name
with
their
path
to
a
text
file
called
[Link]
o root@bt:~#missidentify
-ralv
/mnt/usbflash
>
/root/Desktop/[Link]
Save
[Link]
for
your
report.
Task5_
Crack
Zip
file
Password
fcrackzip
is
a
utility
used
to
crack
Zip
file
password
protection.
There
are
many
Zip
crackers
out
there,
however,
fcrackzip
excels
in
speed
and
features,
especially
the
brute
force
option.
First
you
need
to
create
a
password
protected
zip
file
1. Using
Windows
Explorer,
locate
the
first
file
you
want
to
zip.
2. Right
click
on
the
file
and
select
Send
To
and
Compressed
(zipped)
Folder.
This
will
create
a
new
compressed
folder
with
the
same
name
as
the
file,
except
with
the
extension
.zip.
3. Right
click
any
other
file
you
want
to
compress
and
select
Copy.
Right
click
on
the
compressed
folder
you
created
in
step
2
and
select
Paste.
4.
The
copied
file
was
pasted
into
the
compressed
folder.
5. Repeat
this
until
your
compressed
folder
contains
all
the
files
you
want.
6. Right
click
on
the
compressed
folder
and
select
Explore.
7. In
File,
select
Add
a
Password.
Enter
the
password
and
confirm
the
password
(chose
5
character,
letters,
and
lowercase
only
to
make
the
procedure
faster.
Eg
cisco,
admin).
Run
fcrackzip
terminal
from:
o ApplicationsBackTrackForensicsPassword
Forensics
Tools
fcrackzip
Issue
the
command
below
to
perform
a
brute
force
and
crack
the
password:
o root@bt:~#fcrackzip
-b
c
a
l
5-5
-u
your_zip_file.zip
Task6_Rrecordmydesktop
Recordmydesktop
is
a
screen
casting
software
witch
helps
you
record
your
work
in
a
video
format.
Run
recordmydesktop
from:
o ApplicationsBackTrackReporting
ToolsMedia
Capturerecordmydesktop
In
the
terminal
type:
o root@bt:~#recordmydesktop
It
starts
capturing
all
your
activity.
Stop
the
process
by
ctl+c
Check
home
folder
(placesHome
Folder)
You
can
find
a
file
with
.gov
extension.
This
is
a
video
file
that
can
be
played
using
media
players
like
VLC.