Forensics
Forensics
Forensics
Computer forensics is not exactly like it’s portrayed in the movies and on TV. Performing a computer
forensic investigation requires significant levels of technical skill, patience, organization, and the ability
to follow specific procedures. You need to be able to follow very specific instructions and protocols to
work in the field of computer forensics.
In this section you will see a few basic forensic tools and a forensic suite (which includes a variety of
tools). The forensic suite (CAINE) is actually a Linux distribution that we will run as a virtual machine.
The following projects are intended to give introductory exposure to computer forensics and get your
guys excited about the field of computer forensics. You will not be ready, or qualified, to complete a
forensics investigation after doing this experiment. You will need a great deal more experience and
certified training in order to be qualified to initiate a real investigation. Again, these projects are just an
introduction to the IT security field.
BGINFO
In general, computer forensics gathers information (artifacts) from a computer system while trying to
explain what information is present and its origin. When people first hear the word “forensics” they put
up mental road blocks and just assume that they won’t understand what is going on. We are going to
start slowly with basic software that gathers general information from a computer. Then we will move
on to tools with more functionality.
The first tool we will look at is BgInfo . It shows basic system information on the computer background.
Systems administrators are always running multiple DOS commands or clicking through a series of
windows to get basic information that they need about the local computer. Having it displayed in the
background saves administrators time and effort. Let’s look at a quick example using BgInfo.
Questions
1. What DOS commands would you have to enter to get the information shown by BgInfo?
2. Why would an administrator need to know the IP and MAC addresses for a given computer?
3. Can you change your MAC address?
NIGILANT
Let’s look at a tool that has more functionality and is closer to being a true forensic tool. Nigilant is more
of an incident response took than a complete forensic suite. Nigilant will produce a full report showing
current system information including all processes, services, users, and network ports. These basic facts
may provide investigators with information about what is happening on the system and who is making it
happen. It will help direct the investigation.
Nigilant will also produce a complete physical memory (RAM) dump. Oftentimes there is information
held in RAM that may not be written to the hard drive. This will produce an image file as large as the
amount of RAM installed on the local machine. You can also inspect existing files and /or deleted files
directly without changing them.
Questions
1. Why are investigators so concerned about preserving the times a file was written, accessed, and
created?
2. What types of information would be in the RAM memory dump that wouldn’t be on the hard
drive?
3. Why does the program show the file in hexadecimal?
4. What does the Extract File feature in Nigilant32 do?
CAINE
CAINE is a distribution focused on IT forensics. It is a good learning environment for beginning users.
CAINE has intuitive interfaces, a variety of functionality, and good reporting/documentation tools. Most
IT forensics suites are quite expensive and require a fair amount of training. A free tool like CAINE that
has a good collection, analysis, and reporting tools is invaluable for someone just starting out in the field.