Home

Published

- 2 min read

Let's Defend - Linux Disk Forensics

img of Let's Defend - Linux Disk Forensics

Description

Dean downloaded a cracked software application from an unofficial source and subsequently discovered that his personal data has been leaked. An investigation is now underway to determine the cause of the data leak and mitigate any potential damage.

Tools

Tools Required
1- FTKimger
2- Notepad++
3- Scripting

Writeup

Q1

What distribution system was used by the victim, including its version?

By open the disk image on FTK imager. now we need to start investgiating and find out the system and the version.

1

we will notice it’s a linux distribution so we can get the version by visiting ‘etc/lsb-release’

2

the answer is

Ubuntu 22.04.2 LTS

Q2

What is the SHA256 hash of the crack file that was downloaded?

this is also easy question all u need to check the users by going to home and you will find user called ‘o’ if you check the desktop you will notice file called ‘crack’

3

run sha256sum "FileName" you will get the answer

d73e103c7a980417aefb2683e315180d76bd75eccefbff57802bf97c5efd75fb

Q3

What is the IP address and port used by the attacker?

for this question all u need to do is to find the connection that happened on the system but in another solution we can go and recheck fast the logs ‘var/log/auth.log’ to check if there are any interesting informations. 4

192.168.229.129:201

Q4

What is the specific tool or software employed by the attacker?

as we saw in the previous question the attack used nc command which is netcat tool that uses to transfer data of dean.

netcat

Q5

What Are the files that were stolen during the attack? (In Alphabetical  order splitted by , )

while investigate the logs you will notice a tar command that compress 2 files of google chrome browser 5

Local State, Login Data

Q6

What was the date of the last use of the Dean account?

I found that he used google chrome. And in Linux it’s inside home directory then .config and chrome.

So, Let’s check this file.

7

Okay we got the file now. It’s an SQLite db. let’s open it.

8

Well, there is a user logged in Pastebin so let’s find out how to get the last date used of this user. but if you tried cyberchef it will not work so we need to google how to decrypt google chrome timestamps.

9

you will find an article talking about how to decode the timestamp with SQL Browser. so let’s try executing the MySQL command

SELECT datetime((date_last_used/1000000)-11644473600, 'unixepoch', 'localtime') AS time FROM logins;

10

And you will get the Answer

2023-06-18 16:38:53