UK: +44 748 007-0908, USA: +1 917 810-5386 [email protected]

Chester Digital Forensic

Introduction You are working for a very small company, Chester Digital Forensic n’ Stuff (CDFnS), which advertises itself as providing Digital Forensics to organisations amongst other things. The company has just set up, and the director has employed you as its sole Cyber Security Specialist who has training across the field of cyber security. CDFnS, being new, has no formal procedures yet laid out for anything. CDFnS has just been contracted by a company, Thornton Delivery Services (TDS), to provide them support in identifying a suspected data breach at TDS.

About Thornton Delivery Services (TDS) TDS is a national delivery company based at Thornton Science Park. They employ 50 staff including administration, drivers, and warehouse workers. Their system is reliant on IT systems. Their Business Systems comprise of the following:

• 1 Windows Server 2019 server running: o Active Directory o Roles: DNS, DHCP, File Server o Default logging o Financial software for tracking and accounting o Asset software for tracking parcels

• 1 Debian 8 (Jessie) Linux Server for backup of files off the Windows Server

• 20 in-house client computers which are used primarily by the administration staff, who underpin the day-to-day operations. These are a variety of different Operating Systems in use. To date this comprises of the following deployment: o 15x Windows 10 o 2x Windows 7 o 3x macOS Big Sur TDS Data Breach The Administrator occasionally looks at internal traffic stats for fun in the odd month he is not overworked, and this time, on looking at stats over the previous months, he had noticed something suspect: The Administrator at TDS noticed that there had been a lot of traffic from the Windows Server 2019 firstly to one of the internal Windows 7 client machines, and then by the next day out directly from the Server to the Internet. When the data went to the Windows 7 client machine, and out from the Server, it went late in the evening. The Windows 7 client’s user was at home at both times. The Administrator is not experienced in analysis of logs or in digital forensics.

Task 1: (30%) You need to act swiftly to preserve as much evidence as you need to uncover what is going on. TDS is not expecting any downtime now. Describe and critically analyse the approach you will take from a technical perspective to develop an understanding of what has happened. What will you request access to, and how will you use that data or information provided? Consider multiple possibilities without coming to early conclusions. Establish some sort of process and express it possibly with the help of a diagram, flow chart, or other. Identify any tools you may use, including built-in tools. Remark upon the impact on the business of the approach(es) you decide to take. CDFnS Makes Progress Following Task 1, you find out that: Some logs have been deleted on the Server (the security logs that are normally viewable in Event Viewer). Thousands of logon attempts were made from the Windows 7 client to the Windows Server before successfully getting access to the admin account. These attempts were made from the client machine on the same evening that it was also downloading files from the file server under the user’s account, with access to limited number of files. Some logs have been deleted on the Windows 7 client. Once the attacker had gained access to the Server admin account, he could access any files on the file server, and more confidential files were accessed. Neither the Windows 7 client nor the Windows Server 2019 have been rebooted since the event. You propose to take a memory dump and copy of the hard disks for each machine. TDS would like to get to the bottom of this, and accepts, even if they have to take the server offline overnight (for not more than 12 hours). (Tasks 2 & 3, overleaf…)

Task 2: (40%) Explain the benefit of taking memory and disk copies of both machines. For each, what can you expect to determine? For either the Windows 7 client or the Windows Server 2019: Describe briefly the process of taking a memory copy and a disk copy, minimising impact. For both memory and disk images, describe and critically analyse the approach you would take from a technical perspective to develop a further understanding of what has happened. Identify any tools you may use, and the use of those tools. Consider the precaution taken and the reason for those cautions.

Task 3: (30%) The TDS Administrator has had to deal with many staff opening phishing emails containing malware. E.g. Word Documents, PDF files, ZIP files. They would like to understand measures they can put in place to help prevent users from infecting their computers. The Administrator already knows about Anti-Virus solutions, but these have often not detected malware where it was actually present. From a high-level overview, propose a list of malware analysis tools that the Administrator could use to start to perform basic malware analysis. You should compare these different tools and state if they are to be used for static or dynamic analysis. You can categorise these tools however you see fit. For example: 1. Debugger 2. Disassembler 3. Decompiler For each of these tools, you should demonstrate that you have actually used them in order to give a recommendation on these pros and cons. Do this by including screenshots of you analysing some sample malware files you have made or downloaded.

Finally, you should propose best practise recommendations, focusing on the risks of running malware and some of the preventative methods the Administrator should use when dealing with malware to avoid infecting themselves for real (e.g., Malware escaping from a VM into the host machine).

General Instructions

• Format: The format should be one column, left or justified alignment, have appropriate and meaningful headings/sections. Use a meaningful structure that ensures coherency.

• Referencing: Do not just give a list of references without showing where/how you have used them in the text – ensure you include in-text referencing.

• Support: If you use external support, e.g., for proofreading or translation, you MUST state this. The tutor will provide adequate support to ensure that all students are very clear of what is expected of them in this assessment. So ensure you take this opportunity to get clarifications where you need them.

• Coverage: You are expected to cover all tasks.

• Originality: It is acceptable to use direct quotes from sources. However, excessive use of direct quotes (regardless of whether they are referenced or not) reduces the originality of the work. This and high level of similarity will affect the student’s mark. Assessment Criteria Marks will be affected if the above instructions are not adhered to. As stated above, specific marks are allocated to questions and the level of marks awarded will depend on the depth and quality of answers. Characteristics of Distinction and Pass level answers are distinguished as below: • Demonstrating in-depth knowledge of the skills tested

• Coverage – attempting and getting most or all of the tasks correct

• Showing excellent knowledge of the topic area

• Excellent command, understanding, and usage of relevant tools

• A very sophisticated critical reflection, self-evaluation and new insights informing practical situations.

• Proper use of referencing Pass marks will be awarded for:

• Demonstrating extensive knowledge of the skills tested

• Coverage – attempting and getting most of the tasks correct

• Showing good knowledge of the topic area • Sound command, understanding, and usage of relevant tools

• A sound critical reflection, self-evaluation and some new insights informing practical situations • Proper use of referencing Answers that fall below the above criteria will receive a fail mark

The breakdown of marks for this assessment component is as follows:

Key area Description % Overall Individual report

Task 1 30%

Task 2 40%

Task 3 30

Ready to Score Higher Grades?