Time
5 hours 56 minutes
Difficulty
Intermediate
CEU/CPE
6

Video Transcription

00:01
welcome back to the course. So in the last video, we went ahead and set up our photos to use in this part of the lab where we're actually analyzed. The two photos
00:10
now again. Since we set him up, we obviously know what we typed. We know the differences between the two files. However, again, this is a good lab to do kind of show off to your family and friends.
00:20
So step number one. If you're not already launched into your Windows machine, make sure you log in on and then we're gonna open wherever you saved the two files that so we're basically going to do is open both of the photos, and then we're gonna open our tools. Let's go and do that now.
00:37
So mine I've got saved in this folder here. So go ahead and open both photographs,
00:43
and then we're basically just gonna compare them side by side, so you might have to do a little modification on the sizing of each one. You might also have to d'oh!
00:52
You might have thio close her windows, et cetera, et cetera. So bear with me a second here while I get mind set up might take a moment or so, especially for working inside of a virtual machine.
01:03
And then again, we're just gonna compare these side by side. We're also gonna use our tool tool. So our hash calculator is, well, our it's our hex editor. So the HX d hex editor.
01:14
All right, so bear with me just another moment, while I kind of modifier sizing here just so everybody can see it.
01:23
And by the way, if you have a cat that can actually do this if you have a Catholic and actually plunge the toilet and clean toilets and stuff, please feel free to send him over to my place. And, you know, I'll pay him to clean my bathroom.
01:34
That would be super cool if we could actually trained cast to do stuff, right? All right, the next step here. So if we go back to our lab document, we're gonna go ahead and actually open our hash applications. Wells are hex editor. So that hx d hex editor. So all we do is just double click on each one, So double click on hash coke. Just open that up.
01:53
And then same thing with HX t Just go ahead. Double click on that.
01:57
So, again, we'll use those in just a moment here. I just want to get those open, and then we're gonna actually compare the files on our own here.
02:07
All right, So if you look at these two funnels, let's just look at him visually for a moment, right? So let's just see, Do we notice any difference? It's all so, Andi, look at the photos that you have a few using different photos. Feel free to look at those and then just look at differences. Now, obviously, we know they're both the same photo on and we just used one, and we made some changes to it in the hex.
02:25
But you go ahead and look at him to get to practice on it. So we see a cat here. Was he a cat here?
02:30
Looks like the cat's plunge in the toilet. I see that in both of them. I see a bathroom floor. I see that here. Something black here could be a towel. I could be like a little rug that they put around the toilet. I see that there. I see the wall back here. I see the cats got two ears.
02:46
It's got an eye there. I see the eye. So basically, visually, these two files look the same, right? They look pretty much the same.
02:54
All right, let's go back her lab documents. So question number one here other. Any visual differences in those actual photos?
03:04
All right, so the answer is No. I mean, we kind of knew that again from our setup of this lab, but there are no visual differences that we can tell.
03:10
All right, So we're gonna go ahead and close our photos now and then we're going to right click on each one, and we're just gonna check the file size. So again, as I mentioned in the last video we just wanted we wanted to make sure that we talked a shorter word or a shorter phrase in there. So we didn't alter the file size because, as you see here, that's one of the areas that we do. Check.
03:28
All right. So I'm just gonna go ahead and close these photos here.
03:35
All right? So I'm gonna go back to my folder where I have, um so just go ahead and right. Click on each one and see if you notice a difference in file side. So just right. Click on it, go to properties. And it might take a moment or so to pull up, but it will eventually pull up and tell you this size, which I see here is 85 kilobytes.
03:49
Once we see that, just go ahead next time on that one. Do the same thing here, so just right. Click on it,
03:54
go to properties and then 85 kilobytes. We see right there. So we know that they're Hey, they're both the same file size, huh? All right, so they look the same. They're both the same file size. So what else do we need to look at?
04:05
All right, well, let's go back to our lab document to find out.
04:09
So, Question number two are the files of same size. Yes, they are. Right. We noticed that they were both the same size.
04:15
All right, Next we're gonna check the hashes of the file. So we're gonna do that hash and just kind of like we did with the downloadable file to see if it had been altered ill when we took the hash.
04:26
We're doing the same thing here, right? We're just gonna check the hash of the files and see if there's a difference at all.
04:31
So let's go ahead and do that now. So we're gonna go first for the hash. Coke are hash calculator. So let me just kind of move this window out the way and then also this one as well. And we have our hatch calculator that just decided to close on me. There we go. All right,
04:46
so let's go back to our lab document now. So the first thing we're going to do once we've got the hash, calculate her pulled up a step seven here word and click the three little dots that are on the counter near the top, right of the tool. And there were a select file.
05:00
Let's go and do that. Now
05:01
click those three little dots
05:03
going open up for us. It opens up the search box here, and then we're just gonna find our initial file there. Right? So if we look at our lab document, it's gonna be that very, very first photo that we saved, like from the Internet, More for using, like, a family photo, something like that.
05:20
All right, I'm gonna go ahead and pull mine up.
05:24
He doesn't look like it's pulling up that folder for some reason. Oh, well, that's why I'm looking at the downloads when it's on the desktop. There we are. All right,
05:33
So once we find out where it's at and we pull it up,
05:36
we're just gonna open that very 1st 1 that we did not type anything in right, so that we did not alter and then just say, open there.
05:44
Let's go back to our lab document.
05:46
So now we're gonna unsolicited all the different hash options it set for the MD five. So again we could do a lot of different hash is inside of the hash calculator. We're just gonna choose the MD 51 So let's go ahead and select at and select only that one on. Then click calculate and then especially, make a notation of the hash.
06:04
All right, so we're just gonna unchecked these other couple of one's here,
06:08
and then make sure we just leave them to five and then just say, calculate
06:12
very soon we see our long hash years. Let's go back to our lab document.
06:17
All right, so now we're gonna do where to select those three little dots again and that were to select the file we actually did alter. Right. So we wanna check and see for question three. Here are the file. Hash is the same. So let's go and check that now.
06:30
So those three little dots again
06:32
Now choose a file that you altered in this case, minds cat three Dodge a peg.
06:36
Just say open there.
06:39
Same thing here. Just go ahead and calculate the hash.
06:45
All right, you're gonna notice at the hash is different here than it was in the other one. So Okay, so the photos looked visually the same,
06:53
and then we checked the file size that was a saint.
06:56
But we do a hash out, and they're different, huh? Okay, well, I think we need to take a closer look at those couple of photos.
07:02
Let's go ahead and do that now.
07:04
All right, so we see that. Know the file hashes. We're not the same for those photos again. We altered one of those. We kind of knew what the issue was.
07:13
So now we're gonna switch over to the hex editor were It's like filing open, and the rescuers are gonna look at both photos and see if we notice anything wrong.
07:20
Let's go ahead and do that now.
07:24
So we're to switch back to our A hex editor or a checks D.
07:28
I was gonna select file and then open.
07:32
All right, let's go back to our lab document here. So once we select file on open, we're gonna go back to our again our original photo that we had save and select Open.
07:42
And we're gonna see if we notice any information in there.
07:48
All right, So let me navigate to that spot. We'll grab the photo. So again, that original one was going to say open to that, I take a moment. So and you can if you get this box on the right side of where it says special editors, Data Inspector. Excuse me, inspector. Then just click that little extra that'll close that box for you.
08:07
All right. The score to scroll to the very bottom here and just take a look at the last little bit of character strings there. Do we notice anything readable?
08:16
And if yes, what it is, it's gonna be What is it?
08:20
All right. So the answer is no This is basically our original file, right? So we didn't alter this in any way, so it shouldn't be anything at the very end there. All right, so let's go ahead, and we're next thing we're gonna do is actually open the other file inside of this hex editor. So let's do that now.
08:39
All right. So do we notice any secret information in the first file? The answer is no. We didn't notice anything in there. So next we're just, like, file open, and they were to navigate to that next quote unquote corrupt file.
08:52
Then we're gonna open it up. We're just gonna look for any secret information that might be typed in there.
08:56
So let's go ahead and do that. No.
09:00
All right. So go to file and then open.
09:03
All right, Now we're gonna check the cat three. At least in my example. The cat three Dodge a pig.
09:09
Just say open there
09:11
could take a moment. So whether that's gonna open the hex editor for us, so you might to scroll down a bit.
09:20
All right, so let's go back to our lab document now.
09:22
So the question question five. Is this already secret information hidden in there, right? So you might find different information, Possibly. But is there any secret information inside of the hex? So let's go ahead and take a look.
09:35
Oh, yeah.
09:37
Looks like the word password. Right. So, technically, this is probably, you know, something simple.
09:43
You know, general, this is not something that a malicious actor might hide
09:48
along.
09:50
Amount of information, and especially if they're trying to keep the file size of same. However, keeping that in mind, there are ways around that. But for our purposes, we tied something very short in here. You'll see. That was pretty easy to find, right? We were able to see that The password at the very end there, whatever word you have chosen to use.
10:07
But that's what we're looking for in this particular lab, right? We wantto if we images suspects machine. We noticed a couple photos that are the same thing there.
10:16
Then we generally are gonna want to open them and in a hex editor to see what content is actually in there. Because, you know, if I might be something where this might be the password to get in their actual laptop, right? So then we can use that to get in the laptop and actually get a stronger conviction on the bad person
10:31
are. So in this video, we just wrapped up our analysis of the photos and the next video. Where to start off model, too, for the computer forensics investigation process. So we'll talk about things like the pre investigation phase investigation phase as well as the post investigation phase.

Up Next

Computer Hacking and Forensics

Love the idea of digital forensics investigation? That is what computer forensics is all about. You will learn how to; determine potential online criminal activity at its inception, legally gather evidence, search and investigate wireless attacks.

Instructed By

Instructor Profile Image
Ken Underhill
Master Instructor at Cybrary
Master Instructor