top of page

Performing Incident Response and Forensic Analysis

Section 1: Hands-On Demonstration

Part 1: Analyze a PCAP File for Forensic Evidence

1.png

Make a screen capture showing the Time Graph.

22.png

 Make a screen capture showing the details of the 2021-Jul-13 15:33:00 session.

Part 2: Analyze a Disk Image for Forensic Evidence

3.png

Make a screen capture showing the email message containing FTP credentials and the associated timestamps.

Section 2: Applied Learning

Part 1: Identify Additional Email Evidence

4.png

Make a screen capture showing the email from Dr. Evil demanding that Marvin install a keylogger

6.png

Make a screen capture showing the email from Dr. Evil reminding Marvin to update the firewall and scheduler.

Part 2: Identify Evidence of Spyware

7.png

​. Make a screen capture showing the three events that are related to the Actual Keylogger file in the /Windows/System32/Tasks folder with a June 30 timestamp.

Screenshot_1.png

Make a screen capture showing the one event that is related to the Actual Keylogger file in the /Windows/System32/Tasks folder with a July 1 timestamp.

​Section 3: Challenge and Analysis

​Part 1: Identify Additional Evidence of Data Exfiltration

9.png

Make a screen capture showing an exfiltrated file in Marvin's Outlook database.

Part 2: Identify Additional Evidence of Spyware

11.png

Make a screen capture showing the email with instructions for installing additional spyware.

​

Document the red flags in the email that indicate that it may be a phishing attempt. The red flags are grammar and spelling is unprofessional. The tone of the email is very casual/friendly and tries to appeal to Marvin's humanity. The sender uses slang and abbreviations that are not befitting in the environment.

bottom of page