| 
 (FTK 
Imager: 
Lesson 4){ Mount Image File, Recover 
Deleted File  } 
 
			
				| Section 0. Background 
				Information |  
	What is FTK Imager?
		The FTK toolkit includes a standalone disk imaging program called 
		FTK Imager. The FTK Imager has the ability to save an image of a hard 
		disk in one file or in segments that may be later reconstructed. It 
		calculates MD5 hash values and confirms the integrity of the data before 
		closing the files. In addition to the FTK Imager tool can mount devices 
		(e.g., drives) and recover deleted files.  
Pre-Requisite
		
		FTK Imager: Lesson 1: Install FTK Imager
		FTK Imager: Lesson 2: Create Virtual Hard Drive, Delete File, Recover 
		File
			Note: 
			This lab is necessary, because you will need to create a Virtual 
			Hard Drive.
		FTK Imager: Lesson 3: Create Disk Image after Deleting a Picture
			Note: 
			This lab is necessary, because you will need to create an image 
			after deleting a file. 
	Lab Notes
	
		In this lab we will do the following:
		
			Mount the Image File.View the deleted file.Recover the deleted file.Compare the MD5 sum of the image after 
			work has been completed to its' original MD5 sum. 
Legal Disclaimer
	
		As a condition of your use of this Web 
		site, you warrant to computersecuritystudent.com that you will not use 
		this Web site for any purpose that is unlawful or 
		that is prohibited by these terms, conditions, and notices.
		In accordance with UCC § 2-316, this 
		product is provided with "no warranties, either express or implied." The 
		information contained is provided "as-is", with "no guarantee of 
		merchantability." In addition, this is a teaching website 
		that does not condone malicious behavior of 
		any kind. You are on notice, that continuing 
		and/or using this lab outside your "own" test environment
		is considered malicious and is against the law.
		© 2012 No content replication of any 
		kind is allowed without express written permission.    
			
				| Section 1: Log into 
				Damn Vulnerable WXP-SP2 |  
	Start VMware Player
		Instructions
			For Windows 7
				Click Start ButtonSearch for "vmware player"Click VMware PlayerFor Windows XP
				Starts --> Programs --> VMware 
				Player  Start Up Damn Vulnerable WXP-SP2.
		Instructions:
			Click on Damn Vulnerable WXP-SP2Click on Edit virtual machine SettingsNote(FYI):
		For those of you not part of my class, this 
		is a Windows XP machine running SP2.  Edit Virtual Machine Settings
		Instructions:
			Click on Network AdapterClick on the Bridged Radio buttonClick on the OK Button  Play Virtual Machine
		Instructions:
			Click on Damn Vulnerable WXP-SP2Click on Play virtual machine  Logging into Damn Vulnerable WXP-SP2.	 
	
		Instructions: 		
		
			Click on Administrator 
			Password: Supply Password Press <Enter> or Click the Arrow  Open a Command Prompt
		Instructions:
			Start --> All Programs --> Accessories 
			--> Command Prompt  Obtain Damn Vulnerable WXP-SP2's IP Address
		Instructions:
			ipconfigNote(FYI):
			In my case, Damn Vulnerable WXP-SP2's IP 
		Address 192.168.1.116.This is the IP Address of the Victim 
			Machine that will be attacked by Metasploit.Record your Damn Vulnerable WXP-SP2's 
			IP Address. .   
	
		| Section 2: Start FTK Imager |  
	Start FTK Imager
	
		Instructions: 
		
			Click on the Start ButtonAll Programs --> AccessData --> FTK 
			Imager --> FTK Imager 
	Add Evidence
	
		Instructions: 
		
			File --> Add Evidence Item...
		  Select Source
	
		Instructions: 
		
			Click on the Image File radio buttonClick the Next Button  Select File
	
		Instructions: 
		
			Click the Browse ButtonNavigate to C:\FORENSICSSelect practice-01.001Click the Open ButtonClick the Finish Button   
	
		| Section 4: View Deleted Image |  
	View Deleted File(s) in the Recycler  
		Instructions: 
		
			Navigate to practice-01-001 --> Partition 1 
			--> FTK[NTFS] --> [root] --> RECYCLER --> RECYCLER SUBDIR
				The RECYCLER SUBDIR Directory name variesClick on the jpg file if it exists.
				The naming convention of existing 
				jpg's also varies.  View Deleted File(s) in [unallocated space]
	 
		Instructions: 
		
			Navigate to practice-01-001 --> Partition 1 
			--> FTK [NTFS] --> [root] --> [unallocated space]Scroll through all the files until you 
			see the Captain Crunch Picture   
	
		| Section 5: Recover Deleted Image |  
	Export File
	
		Instructions: 
		
			Right Click on the file that contains 
			the pictureSelect Export Files...  Select the destination folder
	
		Instructions: 
		
			Navigate to C:\FORENSICSClick the OK Button  Export Results
	
		Instructions: 
		
			Click the OK Button   
	
		| Section 6: View Recovered Picture |  
	Open My Computer
	
		Instructions: 
		
			Click the Start ButtonClick on My Computer
		  Rename File
	
		Instructions: 
		
			Navigate to C:\FORENSICSRight Click on the filename that 
			contain all numbers
				In my case the filename is 103415.  
				In your case, it will probably be named differently.Click Rename  Name File
	
		Instructions: 
		
			Rename file to "captain.jpg"  Open File
	
		Instructions: 
		
			Right Click "captain.jpg"Open With --> Windows Picture and Fax 
			Viewer  View File
	
		Note(FYI):
		
		
			CAP'N Crunch was a h4x0r.... nice 
			whistle.   
	
		| Section 7: Calculate Post MD5 Hash |  
	Verify Image
	
		Instructions: 
		
			Right Click practice-01-001Click on Verify Drive/Image 
			  Drive/Image Verify Results
	
		Instructions: 
		
			Copy the last 4 characters of your MD5 
			Hash
			Do Not 
			Click the Close Button   
	Open a Command Prompt
		Instructions:
			Start --> All Programs --> Accessories 
			--> Command Prompt  
	Proof of Lab
		Instructions:
			cd C:\FORENSICStype practice-01.001.txt | findstr 
			"e358c"
				Replace "e358c" with the string you 
				obtained from (Section 7, Step 2)This step verifies that MD5 Hash 
				did not change since the image was first created.date /techo "Your Name"
				This should be your actual name.e.g., echo "John Gray"
		Proof of Lab 
		Instructions
			Press both the <Ctrl> and <Alt> keys at 
			the same time.Do a <PrtScn> Paste into a word document Upload to Moodle  
   | 
    
 
  
		
		
		 |