Honeynet Project
Scan of the Month - 26
February 2003

OFFICIAL RESULTS

Information Recovery Processes

Disk Website
I first examined the DFRWS Website. Not finding anything of apparent value, I then examined the source code of the DFRWS website. Within the source code of the home page I found information that appeared to be related to the investigation. I saved it for later use, if necessary. I found nothing else that appeared to be related to the investigation within the website.

Floppy Image
Starting at cluster 2, each cluster up to and including cluster 65 was part of a JPG file. Each of these clusters was then re-chained in FAT. I then went into the root directory and created a file named "FILE_A.JPG". The size of this file is 32768 bytes (64 clusters * 512 (size of each cluster), starting at cluster 2.

Starting at cluster 66, each cluster up to and including cluster 2344 was part of a single BMP file. Because of the size of this file, I previewed the disk with EnCase and exported out cluster 66 up to and including cluster 2344. I then saved then  clusters together to create a single "FILE_B.BMP" file. Re-chaining each cluster in Disk Edit  would have taken a while.

Invisible Secrets
I then copied both FILE_A.jpg and FILE_B.bmp over to my desktop and ran each of them separately though the Invisible Secrets program.

FILE_A.jpg was the carrier file for a Word document labeled John.doc. The password used to remove and decrypt the Word file was "lefty". John.doc was then saved to the desktop for further review.

FILE_B.bmp was the carrier file for a wave file labeled Jimmy.wav. The password used to remove and decrypt the Wave file was "right". Jimmy.wav was then saved to the desktop for further review.

BACK

HOME

NEXT