Post

Endpoint Forensics: Analyzing a Linux Disk Image in FTK Imager

Endpoint Forensics: Analyzing a Linux Disk Image in FTK Imager

Challenge Description

Challenge Author: Champlain College

Easy(4.5)

Instructions:

  • Unzip the challenge (pass: cyberdefenders.org)
  • Load the AD1 image in FTK imager latest Windows version.

Scenario:

After Karen started working for ‘TAAUSAI,’ she began to do some illegal activities inside the company. ‘TAAUSAI’ hired you as a soc analyst to kick off an investigation on this case.

You acquired a disk image and found that Karen uses Linux OS on her machine. Analyze the disk image of Karen’s computer and answer the provided questions.

Tools:

Question & Answer:

Q1. What distribution of Linux is being used on this machine?

Ans. In the boot section, we can see that the Linux distribution being used is Kali.

alt text

Q2. What is the MD5 hash of the apache access.log?

Ans. In /var/log/apache2/, we can see the access.log file and its MD5 hash in the properties section.

alt text

Q3. It is believed that a credential dumping tool was downloaded? What is the file name of the download?

Ans. In the /root/Downloads folder, we can see the file mimikatz_trunk.zip. Therefore, the tool is Mimikatz.

alt text

Q4. There was a super-secret file created. What is the absolute path?

Ans. In the /root/.bash_history file, we can see the root user history. The absolute path to the secret file is /root/Desktop/SuperSecretFile.txt.

alt text

Q5. What program used didyouthinkwedmakeiteasy.jpg during execution?

Ans. In the .bash_history file, we can see that binwalk was used on the PNG file.

alt text

Q6. What is the third goal from the checklist Karen created?

Ans. “Profit” is the third item on the /root/Desktop/Checklist file.

alt text

Q7. How many times was apache run?

Ans. In the /var/log directory, there are three log files, all of which are empty. This means Apache never ran.

alt text

Q8. It is believed this machine was used to attack another. What file proves this?

Ans. /root/irZLAohL.jpeg

alt text

Q9. Within the Documents file path, it is believed that Karen was taunting a fellow computer expert through a bash script. Who was Karen taunting?

Ans. It looks like in /root/Documents/myfirsthack/firstscript_fixed, Karen is taunting “young.”

alt text

Q10. A user su’d to root at 11:26 multiple times. Who was it?

Ans. In /var/log/auth.log, we can see that the user postgres su'd to root.

alt text

Q11. Based on the bash history, what is the current working directory?

Ans. “cd ../Documents/myfirsthack/” is the last cd command in the bash history.

alt text

Voila! Challenge completed. Thanks for reading.

This post is licensed under CC BY 4.0 by the author.