Lab 4: Shortcuts and Meta Data

When you're done with this lab you will have done the following things:

  1. Identified sources of "what was opened and when"
  2. Extracted thumbnails or summaries of files that may have been deleted.
  3. Extracted metadata about images and other types of files
  4. Uncovered event times and built a timeline of what happened

Throughout this entire lab (and this course), this web site assumes you are using the RHIT-supplied image of Windows and that you're working in partners out of the Digital Forensics Workbook (Michael K. Robinson).

Expectations

Details about expectations for your lab book are available in the previous labs.

Keep in mind as you work on this lab that your efforts must be Repeatable and Reproducible.

Document your steps as you do them. At the end of each part (chapter), be sure to update your lab writeup with a short summary or conclusion, then sign and date it.

When you acquire evidence or artifacts, you must document:

Chapter 14: Shortcuts/Link files and Jump Lists

Read chapter 14 and follow the instructions it contains.

Do activity 14-1

You can obtain MiTeC Windows File Analyzer (WFA.zip) and Shortcuts.zip from the mirror.

SKIP the additional exercises in 14-1

Do activity 14-2

JumpLister is small, get it from the website in the book. You can get JumpLists.zip from the mirror.

Step 15 is wrong: The timestamp for circle 9 is incorrect: the picture shows the correct time.

Do the additional exercises in 14-2

You can get JumpLists-2.zip from the mirror.

Chapter 15: Thumbnail Caches

Read chapter 15 and follow the instructions it contains.

Do activity 15-1

You can obtain Thumbnails.zip from the mirror.

Do the additional exercises in 15-1

Do activity 15-2

Do the additional exercises in 15-2

You can obtain OSForensics (osf.exe) from the mirror.

Do activity 15-3

Do the additional exercise in 15-3

Chapter 10: File Analysis

Read chapter 10 and follow the instructions it contains.

You can obtain File_Analysis.zip from the mirror.

Do activity 10-1

Step 12 is wrong: The date shown in the text is incorrect, so is the little "3" indicator. The date in the screenshot is correct, but it is not the one with the "3" indicator.

Do the additional exercises in 10-1

Do activity 10-2

You can obtain the ExifRead program from the mirror.

Do the additional exercises in 10-2

These are the same three steps for four files (photo{2-5}.jpg). You may find it handy to make a table in your lab writeup and describe how to read your entries in the table.

Chapter 18: Timestamps and Timelines

Read chapter 18 and follow the instructions it contains.

You probably already have WinPrefetchView installed from a previous lab.

You can obtain MiTeC Windows File Analyzer (WFA.zip) and timeline.zip from the mirror.

Do activity 18-1

Step 7: To find more info about a prefetch item, right click it and choose properties.

Step 8: The dates may vary. Some unzip tools will change modified times; you have three times: interpret them the best as you can.

Step 10: The "Windows Shortcut" is in the Windows-Recent folder you unziped from timeline.zip.

Step 15: The Hidden.docx file is in the parent folder of your shortcut -- it is not the shortcut (.lnk).

Do activity 18-2

"Event Log Viewer" is a native windows program. You can find it by searching for "Event Viewer".

NOTE: Events.zip does not exist. Instead, download EventLogs.zip from the mirror.

Do the additional exercises in 18-2

Optional Exercises:

For real, this time. This is optional. It may not work on your system.

Do activity 18-3

You can get a 64-bit version of plaso (log2timeline) from the mirror.

Do the additional exercises in 18-3

Finishing This Lab

When you're done with this lab, read over your lab writeup and ensure you've properly documented what you've done and with what you've worked.

Submit your lab write-up for grading (to moodle in PDF format) when you are done with the lab.