|
Course Outline:
Day 1
Context and
Background of the course (introduction to the purpose behind the course, i.e.,
tracking, DFIR, pentesting, site security)
Discuss tools
and computer setup for examination
o
BlackLight, Oxygen Forensics, AXIOM, Physical Analyzer, and Python
o
Date/time setup
o
Case Data
o
Evidence
o
Investigations Folders
Review of the
forensic tools, how to export data, how to report information, how to analyze
First look at
smart phone and computer databases
o
Performing sqlite queries to pull the information
o
Exporting the data to a usable format
o
Create Report
Day 2
Review of
previous day and written quiz.
Review of
smart phone app types, what type of data they have and how can it be useful,
with specific focus on what apps hold what information, such as timelines,
searches, geolocation data, etc.
Practical
exercise in reporting timeline and geo data to a useful format, Instructor Led.
Background of
wireless in general and Cell/GSM/CDMA/LTE/WiFi/Bluetooth in particular.
Peculiarities
of wireless signals, transmission power, antenna types, range, etc.
MAC
Addressing, vendors, trends, random MACs, BSSIDs, patterns of MAC addresses in
WiFi and Bluetooth
Day 3
Review of
previous day and written quiz.
Connection behaviours
scanning, probe requests, handshaking, disconnection, broadcast vs.
non-broadcasting, etc. (basically, things to look for and what they mean)
Correlation of wireless items with real-world things, small intro to online
searching.
Types of WiFi
devices and their implications and behaviours (APs, clients, game systems,
smart watches, laptops, phones, tablets, iOT devices, etc.) How do they act,
where will you see them and what it all means. How our suspect's device may
interact with those devices and what types of traces this leaves.
How we can
use those devices to geolocate other devices, build a profile of our suspect,
and use that information to further an investigation.
Practical
exercise in building a comprehensive timeline in Google Earth of device
activity, locations, etc., around the time of the commission of a crime.
WiFi and BT
collection/scanning tools and what they are good for: Kismet, Wigle, Acrylic,
Cain, blue_hydra, RamBLE
Day 4
Review of
previous day and written quiz
Geolocation
and geocoding basics.
Geolocation
from digital forensic tools, such as Cellebrite, Axiom, and Oxygen. Limitations
and strengths. How to augment the information they already have with more data
and analysis. (Some prepared Python scripts will be used here to find evidence)
Web sites
that can be used, tools for plotting and tracking
o
OpenCellid.org
o
Wigle.net
o
Mozilla MLS
o
Other sites to find historical locations of devices
Open-Source
Intel (OSINT) Augmentation of forensic data
o
Theory of enriching forensic data with openly-available information on the net
o
Demonstration
Practical
exercise in finding, correlating, plotting, and reporting on different types of
data using web and other open-source tools
Building a
profile of a suspect based on the data found on the device and augmentation
with OSINT techniques
Day 5
Review of
previous four days and written quiz.
Reporting:
Pulling it all together, review of integrating device activity, wireless
activity, positional data, OSINT sources, and all other previously-shown
technique to produce a coherent report
(FINAL TEST
AND PRACTICAL SHOULD TAKE 3+ HOURS)
o
Final Written Test: combination knowledge-based and Internet-search based
practical test
o
Final Practical: given a phone dump and a defined objective, time of crime,
etc., and produce:
o
Comprehensive profile of the suspect, personal info, where they live, etc.
o
Analysis of background patterns and behaviors, such as locations and activities
(historical)
o
Complete yet concise timeline of relevant suspect activities around the time of
the crime
o
Maps and details of WHERE, WHAT, and WHEN the suspect did things
o
Readable report
Setting up
their own accounts
Hands-on Case
Final Exam
|