Description
Integrating Digital Forensics With Incident Response
Please navigate to the Lab Callout Box within the Content section (see Activities) for this week which also includes detailed instructions for this assignment. All links to open the appropriate documents and to launch the Citrix virtual environment will be found at this location.
/ 4
Examiner Name
CMIT 424
**Remove / replace all red writing prior to submission**
To:
Requestor Information
Date:
Report Date
Case #:
XXXXXX
Title:
Case T
itle, I.E. Suspect Name & Type of Case
Date item(s) received:
Date received by examiner
Item(s) Submitted for Exam:
Item#
Description Make Model S/N#
Case Summary
:
A summary of the request, i.e. by whom, why, what is being ask to search for and recover,
etc. Why is this examination being conducted?
Legal Authority:
Search warrant, consent, government/organizational property, etc.
Software Tools Used:
Tool Name Version Used For
Ex. Windows 10
10.0.17763
Operating system of forensic
laptop.
Hardware Tools Used:
(simulate write blocker(s) and system information)
Tool Name S/N# Used For
Ex. Tableau TD2u
#12345
Hard drive imaging.
1
Preliminary Findings:
This is a synopsis of what you found of forensic value i.e. Out of analyzing “x” number of
files, “x” were of forensic value; briefly describe the types of files discovered (you’ll get into
the details in the next section).
Also briefly describe the partition and file structure of the media examined i.e. partitions,
volume names, sizes, files systems.
Details of Examination:
(
This will typically be the longest part of this document.
It is more than
just answering the case questions!
Please be sure to read the
assignment deliverables carefully at the end of each lab).
Describe your examination procedures performed, i.e. signed for items for examination,
photographed evidence, conducted pre/post hash (describe why you perform hash analysis –
show both acquisition and verification hash sums)
, describe tools validation procedures
(your forensic hardware and software), anti-virus scans conducted.
Documentation of results to include answering questions detailed in the request, etc. This is
where the
files of forensic interest
are reported on and linked to the case questions /
scenario. Findings should be described just not with words but snippets, screen shots, and
addendums when practical.
If you feel that some detailed findings would be better placed in an addendum that is fine.
Including triage tables, snippets of your findings, and other visual aids will better visually
guide the reader so consider using those in the labs and definitely the FR1 and FR2
assignments. Remember that readers of these reports are often not technical by trade.
Including an evidence photo(s) is also best practice (see Addendum A).
Conclusion / Recommendations:
State the facts only and avoid opinion / emotional explanations. Detail any further
examinations that maybe required, interview questions of subject(s) if applicable, what
could further be done in the investigation from the outcome of your examination, etc.
Disposition
of Evidence
:
Document here the disposition of the items submitted for exam, i.e. stored in evidence
control, returned to requestor etc.
Report End
2
Addendum A: Photos
Simulate with pictures of similar devices you can find on the Internet. It is best practices to
include a picture(s) of the evidence you examined. For example:
The following is a photograph of Lenovo Laptop, Model 7834, Serial #765432.
PICTURE(s) SHOWN HERE (find an example using “Google Images”)
You may want to include the hash values in this area and just refer the reader to Addendum A
in the main document.
Example:
The following details the forensic image processing.
Example: Seagate Hard Drive, 250GB, Serial #12345:
Digital Forensics Examiner (DFE) created forensic evidence files of XXXX drive #XXXX.
The pre-processing hash results are presented below:
MD5 checksum: XXXX
SHA1 checksum: XXXX
The forensic processing subsequently created XXXX (X) files (simulated).
Forensic Evidence Files Created: XXX.E01 – XXXX.E04 (example with four files)
The forensic imaging process involved a post processing hash verification of the contents of the
evidence file compared with the pre-processing hash. The hash analysis is presented below.
MD5 checksum: XXXX: verified
SHA1 checksum: XXXX: verified
The forensic imaging process successfully created a forensically sound and verifiable bit stream
copy of the hard drive in the form of forensic evidence files.
3
Addendum B: Steps Taken
These are your notes on the steps you took while conducting the examination. Often, the
examiner must submit their notes along with the forensic report if a case goes to court.
I recommend just numbering your steps i.e. 1, 2, 3 in chronological order.
Start with how you received the media and describe how you sterilized.
For example:
1. Original USB drives and CD-Rs received from R. Jones. Items labeled and chain of custody
(COC) documentation initiated.
2. Forensically sterilized target media prepared using Paladin vX.XX.XXX. After launching the
Paladin tool, the target media was physically connected to the workstation running Paladin.
Target media was wiped and verified using command “sudo dcfldd pattern=00 vf=/dev/sdc.”
Results were a match, verifying the target media was forensically sterile.
3. Describe your analysis steps.
4. cont’d
Include as many addendums as necessary to fully describe your findings. Ensure that all
addendums are referenced from the summary report.
Consider inserting “Bookmarks” (information that you have determined is of evidentiary value)
from your EnCase examination either into the “Detailed Findings” section in the summary
report template or as a separate addendum to fully describe your findings and answer the case
questions (each week’s Lab Lecture document will describe the scenario and case questions to
be answered).
Remember to spell check your work before submitting.
4
Enter the password to open this PDF file.
File name:
–
File size:
–
Title:
–
Author:
–
Subject:
–
Keywords:
–
Creation Date:
–
Modification Date:
–
Creator:
–
PDF Producer:
–
PDF Version:
–
Page Count:
–
Preparing document for printing… 0%