sample-linux_2

24
Windows Systems and Artifacts and Analysis: WK4 Course Name: CYB652 Professor: Vernon McCandlish Date: 2/09/2015 Examiner Name: Raymond Gonzales

Upload: raymond-gonzales

Post on 14-Feb-2017

69 views

Category:

Documents


0 download

TRANSCRIPT

Page 1: SAMPLE-Linux_2

Windows Systems and Artifacts and Analysis: WK4Course Name: CYB652

Professor: Vernon McCandlishDate: 2/09/2015

Examiner Name: Raymond Gonzales

Page 2: SAMPLE-Linux_2

Table of ContentsList of Illustrative Materials............................................................................................................3

Figures.........................................................................................................................................3Tables...........................................................................................................................................3

Graded Lab Assessment..................................................................................................................4Observations of Results and Findings.........................................................................................4

Lnk-parse-1.0.pl.......................................................................................................................4Lslnk.pl....................................................................................................................................5Lnkanalyzer.exe.......................................................................................................................5

Discussion of Results...................................................................................................................7Conclusion.......................................................................................................................................9Appendix A....................................................................................................................................11

Page 2 of 22

Page 3: SAMPLE-Linux_2

List of Illustrative Materials

FiguresFigure 1: lnk-parse-1.0.pl Output for Mawg.jpg.lnk.......................................................................5Figure 2: lslnk.pl Output for Mawg.jpg.lnk in UTC........................................................................5Figure 3: lnkanalyser.exe Output for Mawg.jpg.lnk........................................................................6Figure 4: Local times of Sunset.jpg.lnk...........................................................................................7Figure 5: Irregular time offsets for Sunset.jpg.lnk in UTC.............................................................8Figure 6: Tracker Data Block for temp.lnk.....................................................................................9Figure 7: Win7 SP1: lnk-parse-1.0.pl – Mawg.jpg.lnk..................................................................11Figure 8: Win7 SP1: lslnk.pl – Mawg.jpg.lnk...............................................................................11Figure 9: Win7 SP1: lnkanalyser.exe – Mawg.jpg.lnk..................................................................12Figure 10: Ubuntu: lnk-parse-1.0.pl – Mawg.jpg.lnk...................................................................12Figure 11: Ubuntu: lslnk.pl – Mawg.jpg.lnk................................................................................13Figure 12: Win7 SP1: lnk-parse-1.0.pl – Sample Pictures.lnk......................................................13Figure 13: Win7 SP1: lslnk.pl – Sample Pictures.lnk...................................................................14Figure 14: Win7 SP1: lnkanalyser.exe – Sample Pictures.lnk......................................................15Figure 15: Ubuntu: lnk-parse-1.0.pl – Sample Pictures.lnk.........................................................15Figure 16: Ubuntu: lslnk.pl – Sample Pictures.lnk.......................................................................16Figure 17: Win7 SP1: lnk-parse-1.0.pl – Sunset.jpg.lnk...............................................................16Figure 18: Win7 SP1: lslnk.pl – Sunset.jpg.lnk.............................................................................17Figure 19: Win7 SP1: lnkanalyser.exe – Sunset.jpg.lnk...............................................................18Figure 20: Ubuntu: lnk-parse-1.0.pl – Sunset.jpg.lnk..................................................................18Figure 21: Ubuntu: lslnk.pl – Sunset.jpg.lnk................................................................................19Figure 22: Win7 SP1: lnk-parse-1.0.pl – temp.lnk........................................................................19Figure 23: Win7 SP1: lslnk.pl – temp.lnk.....................................................................................20Figure 24: Win7 SP1: lnkanalyser.exe – temp.lnk........................................................................21Figure 25: Ubuntu: lnk-parse-1.0.pl – temp.lnk...........................................................................21Figure 26: Ubuntu: lslnk.pl – temp.lnk.........................................................................................22

TablesTable 1: Data Folder and Link Files to be analyzed........................................................................4Table 2: Tracker Data Block Details Explained..............................................................................9

Page 3 of 22

Page 4: SAMPLE-Linux_2

Graded Lab Assessment

Observations of Results and Findings

Throughout the lab the examiner performed various exercises with each of the parsing tools on a sample link file in order to gain familiarity with the capabilities of each of the parsing tools. The tools used by the examiner to parse the link files were: lnk-parse-1.0.pl, lslnk.pl, and lnkanalyser.exe. The parsing tool lnkanalyser.exe was a tool that was selected by the examiner to replace the lab recommended lp.exe parsing tool. The lnkanalyzer.exe tool can be found and downloaded from the woanware website: http://www.woanware.co.uk/forensics/lnkanalyser.html. Each of the parsing tools provided the examiner with information that identified the file’s: MAC times, working paths, volume ID and serial number, and file’s size.

Using the various parsing tools the examiner performed the requested examination of the provided link files. The name of the data folder and the names of the link files to be analyzed can be seen in table 1.

File Name MD5CYB652.2014.Spring.Week4.Samples.zip 8b605addb191d2d79682a174bfbe7a56Mawg.jpg.lnk f46942cca5621ef29ef1b1de9ccdb2eeSample Pictures.lnk 44ecaa892a3ec3b14b32de7fbbad0bbcSunset.jpg.lnk ad7b92ff1524c1107d553429aa40b53etemp.lnk ba967bee1a535f8fb490f252bbdcb9ea

Table 1: Data Folder and Link Files to be analyzed

Lnk-parse-1.0.pl

Lnk-parse-1.0.pl is a command line based parsing tool that is capable of parsing data from link files on both Windows and Linux based OS. When using the tool on Windows the MAC times were outputted using the machine’s local time; while the Linux OS presents the MAC times in UTC. When the lnk-parse-1.0.pl tool was used to parse data from the four provided link files, the tool would output: file name, link flags, file attributes, MAC times, file length, volume type, volume serial number, and the base path. An example of the lnk-parse-1.0.pl tool’s output for the Mawg.jpg.lnk file can be seen in figure 1. Screenshots of the link file’s outputs can be viewed in Appendix A.

Page 4 of 22

Page 5: SAMPLE-Linux_2

Figure 1: lnk-parse-1.0.pl Output for Mawg.jpg.lnk

Lslnk.pl

Lslnk.pl is another command line based parsing tool that is capable of parsing link files on both Windows and Linux based OS and the output is unaffected. When the examiner used the lslnk.pl tool to parse data from the provided link files, the examiner noticed that the lslnk.pl tool provides almost identical parsed metadata outputs about each of the files. But, the examiner noticed that the lslnk.pl tool provides its MAC times in UTC instead of the host computer’s local time like the previous tool. An example of an lslnk.pl output can be seen in figure 2 below. Screenshots of the link file’s outputs can be viewed in Appendix A.

Figure 2: lslnk.pl Output for Mawg.jpg.lnk in UTC

Lnkanalyzer.exe

The lnkanalyzer.exe tool was selected by the examiner in order to replace the lp.exe parsing tool that was unable to be used in the lab. Like the previous tools, lnkanalyzer.exe provides the examiner with various parsed metadata about the .lnk file. However, unlike the other tools the

Page 5 of 22

Page 6: SAMPLE-Linux_2

lnkanalyze.exe tool provides the examiner with new parsed information called, “Tracker Data Block” as seen in figure 3.

Figure 3: lnkanalyser.exe Output for Mawg.jpg.lnk

The Tracker Data Block provides information that can be used to identify the local machine’s name and identify if a link file has been moved or copied from its original location. Understanding and analyzing this information can provide the examiner with additional insight about the link file associated with the original file. Screenshots of the link file’s outputs can be viewed in Appendix A.

When using the various tools on the link files the examiner was able to view and analyze the metadata and other artifacts for each of the files. The examiner observed an anomaly within the MAC times when the file, “Sunset.jpg.lnk” was parsed with lnk-parse-1.0.pl and lslnk.pl. The examiner noticed that the time offset for the “last modification” timestamp did not correspond to the creation and last access times of the file.

Page 6 of 22

Page 7: SAMPLE-Linux_2

Discussion of Results

During the lab the examiner used various parsing tools on the provided link files in order to examine the data contained within each of the link files. The examiner observed and analyzed the various capabilities of each of the tools when parsing the link files and analyzed the various outputs from each of the parsing tools. The examiner observed when using the parsing tools throughout the lab, not one tool was capable of providing all of the information that was available within the link files. But, each of the tools used throughout the lab was able to provide data that could be analyzed to confirm the findings of each of the tools.

An example of this was seen when the lnk-parse-1.0.pl and lslnk.pl and lnkanalyser.exe tools were used to parse data from the various link files. All the tools provided similar outputs from the link files; but only the lnk-parse-1.0.pl tool provided file times that corresponded to the machine’s local time, while the lslnk.pl and lnkanalyser.exe tools provided the file’s times in UTC. Using the capabilities of each of these tools to analyze the link files allows the examiner to compare and confirm outputted parsed data. The benefit of having tools that provide output data based on the local machine’s time and UTC is that the file’s offset times can be calculated and determined by the examiner. Using this additional information can help the examiner determine the physical location of the local machine that was used to create the link files. An additional benefit of knowing the offset MAC times for the files allows the examiner to identify any anomalies within the link files. While performing the examination on the link files the examiner came across such an anomaly with an individual file. When the examiner parsed the file, “Sunset.jpg.lnk” the examiner noticed an anomaly within the MAC times of the link file. As seen in figures 4 and 5 the file’s MAC offset times do not match throughout the file.

Figure 4: Local times of Sunset.jpg.lnk

Page 7 of 22

-7-7+5

Page 8: SAMPLE-Linux_2

Figure 5: Irregular time offsets for Sunset.jpg.lnk in UTC

While the creation and last accessed times have an offset of UTC -7 the last modified time has an offset of UTC +5. , which leads the examiner to believe that anti-forensic measures may have possibly been used on this specific file and additional analysis on this file would be required. When an anomaly like this is seen in an investigation it’s a sign of possible data tampering by the user, which would require the examiner to perform additional analysis on the file in order to confirm or disregard this suspicion.

When using the lnkanalyser.exe tool on the various link files the examiner was provided information about the file’s “Tracker Data Block.” The Tracker Data block provides the examiner with specific information that is unique to the link file. As example of the Tracker Data Block can be seen in figure 6 and an explanation of the Tracker Data Block can be found in table 2.

Page 8 of 22

Page 9: SAMPLE-Linux_2

Figure 6: Tracker Data Block for temp.lnk

Tracker Data Block ExplanationMachineId:vernmcc-965f0ee

Identifies the name of the local machine that created the link file

NewVolumeId: 225ED670286A3846BD4A2A8C1314D862

Identifies the current volume where the file is stored

NewObjectId:0FAB4C438D03E2118B46000C2901A78E

Identifies the current ID associated with the file

NewObjectId Timestamp:9/21/2012 1:40:02 AM

Identifies the current file’s creation timestamp

NewObjectId Sequence Number:2886

Identifies in what sequence the file was created

NewObjectId MAC Address:00:0C:29:01:A7:8E

MAC address of the host computer

BirthVolumeId: 225ED670286A3846BD4A2A8C1314D862

Original volume ID that is assigned to the created file

BirthObjectId: 0FAB4C438D03E2118B46000C2901A78E

Original object ID that is assigned to the MFT for the created file

BirthObjectId Timestamp:9/21/2012 1:40:02 AM

Original timestamp that is assigned to the created file

BirthObjectId Sequence Number:2886

Original sequence number that is assigned to the created file

BirthObjectId MAC Address:00:0C:29:01:A7:8E

Original MAC address that is assigned to the created file

Table 2: Tracker Data Block Details Explained

By analyzing the information contained within the Tracker Data Block the examiner can identify additional useful metadata information about the link file. This additional information can provide additional insight about the file that has already been parsed by the previous forensic tools.

Conclusion

After completing the analysis of the link files with the various parsing tools, the examiner was able to gain further insight and understanding about the full capabilities of each of the parsing tools. Throughout, the lab the examiner fully exercised each of the parsing tools on each of the link files in order to collect various metadata about each of the link files. Having used the various parsing tools throughout the lab on the link files the examiner was able to collect various output data from each of the link files. With these findings the examiner was able to compare output data from each of the tools and verify various metadata findings. It was through the use of various parsing tools that the examiner was able to determine the link files’: MAC times, working paths, volume ID and serial number, file sizes, machine ID, and determine whether the file had been moved from its original location. By understanding the capabilities of each of the tools and what the outputted metadata means, the examiner was able to determine the time zone offset from the local machine as UTC -7; as well as discover possible evidence of data tampering occurring on one of the provided link files. Now understanding what possible metadata contents

Page 9 of 22

Page 10: SAMPLE-Linux_2

can be stored in link files; the examiner now understands the importance of using parsing tools to perform analysis on link files that are discovered during a forensic investigation.

Page 10 of 22

Page 11: SAMPLE-Linux_2

Appendix A

Figure 7: Win7 SP1: lnk-parse-1.0.pl – Mawg.jpg.lnk

Figure 8: Win7 SP1: lslnk.pl – Mawg.jpg.lnk

Page 11 of 22

Page 12: SAMPLE-Linux_2

Figure 9: Win7 SP1: lnkanalyser.exe – Mawg.jpg.lnk

Figure 10: Ubuntu: lnk-parse-1.0.pl – Mawg.jpg.lnk

Page 12 of 22

Page 13: SAMPLE-Linux_2

Figure 11: Ubuntu: lslnk.pl – Mawg.jpg.lnk

Figure 12: Win7 SP1: lnk-parse-1.0.pl – Sample Pictures.lnk

Page 13 of 22

Page 14: SAMPLE-Linux_2

Figure 13: Win7 SP1: lslnk.pl – Sample Pictures.lnk

Page 14 of 22

Page 15: SAMPLE-Linux_2

Figure 14: Win7 SP1: lnkanalyser.exe – Sample Pictures.lnk

Figure 15: Ubuntu: lnk-parse-1.0.pl – Sample Pictures.lnk

Page 15 of 22

Page 16: SAMPLE-Linux_2

Figure 16: Ubuntu: lslnk.pl – Sample Pictures.lnk

Figure 17: Win7 SP1: lnk-parse-1.0.pl – Sunset.jpg.lnk

Page 16 of 22

Page 17: SAMPLE-Linux_2

Figure 18: Win7 SP1: lslnk.pl – Sunset.jpg.lnk

Page 17 of 22

Page 18: SAMPLE-Linux_2

Figure 19: Win7 SP1: lnkanalyser.exe – Sunset.jpg.lnk

Figure 20: Ubuntu: lnk-parse-1.0.pl – Sunset.jpg.lnk

Page 18 of 22

Page 19: SAMPLE-Linux_2

Figure 21: Ubuntu: lslnk.pl – Sunset.jpg.lnk

Figure 22: Win7 SP1: lnk-parse-1.0.pl – temp.lnk

Page 19 of 22

Page 20: SAMPLE-Linux_2

Figure 23: Win7 SP1: lslnk.pl – temp.lnk

Page 20 of 22

Page 21: SAMPLE-Linux_2

Figure 24: Win7 SP1: lnkanalyser.exe – temp.lnk

Figure 25: Ubuntu: lnk-parse-1.0.pl – temp.lnk

Page 21 of 22

Page 22: SAMPLE-Linux_2

Figure 26: Ubuntu: lslnk.pl – temp.lnk

Page 22 of 22