Digital forensic examiners are investigators who are experts in gathering, recovering, analyzing, and presenting data evidence from computers and other digital media related to computer-based .They might work on cases concerning identity theft, electronic fraud,investigation of material found in digital devices ,electronic evidence, often in relation to cyber crimes.
DIGITAL FORENSICS:CORPORATE INVESTIGATIONS WITH BELKASOFT
free on-demand course Corporate Investigations with Belkasoft: Training Course
This course is designed for those who aim to harden the security of their business networks and learn how to enable quick incident response procedures to a variety of data breaches.
Another potential audience for this course is CIRT/incident response team members, whose role is to take care of the company’s internal investigations, including employee misconduct, trade secrets theft and so on. Corporate eDiscovery and cyber compliance specialists will also find this course useful.
Unpack the archive file Archive password: vr3KapmZ1tI42H7qARF0
What was the last wireless connection on the system?
What time zone is set on the suspect machine? Has it been changed recently?
:HKEY_LOCAL_MACHINE\Software\Microsoft\Windows NT\CurrentVersion\Time Zones
:Easter Island Standard Time, not changed recently
You believe that SDelete was used to hide evidence in the training case. Where could you see the traces of its potential execution? Select all that apply.
WxTCmd is a parser for the new Windows 10 Timeline feature database.
What information could be obtained from Jumplists?
You are going to first look in Anit.ghosh’s Recent folder. This is located in the following path for versions
7-10 of Windows:
This folder contains the user’s link files. A link file, or LNK, is a Windows shortcut that points back to an
original file. A link file is generally created when a file is first opened. Link files are important during
analysis, because they show where files were located, when they were opened, and they contain date and
time stamps associated with the file. If you look at Windows Explorer and go to the Recent folder, you
can see your own link files.
Back in Autopsy, look at the link file called PHOTOS.7z.lnk and click on the Results view. Autopsy will show
you the path of where PHOTOS.7z was stored when it was opened.
Highlight Jump Lists in AutomaticDestinations, Right-Click and Select Extract File(s)
Click Load in Jumplist Explorer. Navigate to your export folder that contains the jump list files. Highlight and select each jump list file and
click Open
Find a source code package downloaded from git.pm.internal. What is the SHA256 hash of the archive file?
Which file was downloaded from a browser after the user connected to the wireless network: “Network 4”?
You have a hashset database and need to check which files were present on the suspect machine. Which of the following files were detected during hashset analysis?
Advanced Live RAM analysis with Belkasoft
Thank you for completing the Belkasoft Training Course.
DIGITAL FORENSICS:How to Determine the Last Shutdown Time and Date in Windows
หากคุณเป็นผู้ตรวจสอบหลักฐานทางดิจิทัล อาจมีบางครั้งที่คุณจำเป็นต้องทราบประวัติการ ปิดเครื่องของคอมพิวเตอร์ มีหลายวิธี ทำตามขั้นตอนด้านล่างเพื่อดูประวัติการปิดใน Windows เช่น เครื่องมือ Windows ในตัวที่เรียกว่า Event Viewer
Windows Event log.
To find when was a computer last shutdown, check the Event Viewer for the most recent Event ID 1074.
Run eventvwr.msc to start the Event Viewer.
In the Event Viewer, expand Windows Logs → System
Sort the log by Date (descending)
Click Filter Current Log… on the right pane.
Add event id: 1074 in the Includes list, and enable all event types
Event ID 6005 and 6006
Alternately, you can also look for Event ID 6006 “The Event log service was stopped.” and 6005 “The Event log service was started.” which denotes that a shutdown or a restart event had taken place at the specified time.
Using Windows registry
Windows also stores the last shutdown date and time in a REG_BINARY value named ShutdownTime in the following
Format Little-Endian Hexadecimal Windows Filetime (UTC) 2021-04-30 00:59:59
ShutdownTime Value = 4A 49 00 25 5C 3D D7 01
Working with a forensics image, you can follow the same steps with the image that you’ll have previously mounted as an Item on FTK Imager (or Imager Lite if you prefer).
To do this, you must launch FTK Imager and then click File→Add Evidence Item→Image file and then click on your image.
To extract Registry files you must search in the directory at thepath %SystemRoot%\System32\Config, right-click on the file you need them and then select the export option. To extract the System file.
AccessData Registry Viewer is a program that lets you view the contents of Windows operating system registries.
ShutdownTime Data = 4A 49 00 25 5C 3D D7 01 (30-Apr-21 00:59:59 UTC)
Registry Recon, developed by Arsenal Recon, is a powerful computer forensics tool used to extract, recover, and parse registry data from Windows systems.
ShutdownTime Data = 4A 49 00 25 5C 3D D7 01 (30 Apr 21 12:59:59 AM UTC)
How to check the MD5 (or SHA1) hash checksum of an entire Volume.
Navigate to "Verify/Create Hash" from the sidebar or Start page in OSForensics
Select "Volume" and the disk/volume that was added in Step 2 from the dropdown list
Select the hash function and click the Calculate button
Once the hash has been calculated, copy/paste the expected hash value into the comparison hash field. If the hash matches, a green checkmark appears. Otherwise, a red cross is displayed
How to check the MD5 (or SHA1) hash checksum of file.
Navigate to "Verify/Create Hash" from the sidebar or Start page in OSForensics
Select the hash function and click the Calculate button
Once the hash has been calculated, copy/paste the expected hash value into the comparison hash field. If the hash matches, a green checkmark appears. Otherwise, a red cross is displayed
How to check the MD5 (or SHA1) hash checksum of text.