Use Autopsy to investigate artifacts from a disk image.
In the attached VM, there is an Autopsy case file and its corresponding disk image. After loading the .aut file, make sure to re-point Autopsy to the disk image file.
Ingest Modules were already ran for your convenience.
Your task is to perform a manual analysis of the artifacts discovered by Autopsy to answer the questions below.
This room should help to reinforce what you learned in the Autopsy room. Have fun investigating!
What is the MD5 hash of the E01 image?
What is the computer account name?
List all the user accounts. (alphabetical order)
Who was the last user to log into the computer?
What was the IP address of the computer?
What was the MAC address of the computer? (XX-XX-XX-XX-XX-XX)
What is the name of the network card on this computer?
Intel(R) PRO/1000 MT Desktop Adapter
What is the name of the network monitoring tool?
A user bookmarked a Google Maps location. What are the coordinates of the location?
A user has his full name printed on his desktop wallpaper. What is the user’s full name?
A user had a file on her desktop. It had a flag but she changed the flag using PowerShell. What was the first flag?
The same user found an exploit to escalate privileges on the computer. What was the message to the device owner?
2 hack tools focused on passwords were found in the system. What are the names of these tools? (alphabetical order)
There is a YARA file on the computer. Inspect the file. What is the name of the author?
Benjamin DELPY (gentilkiwi)
One of the users wanted to exploit a domain controller with an MS-NRPC based exploit. What is the filename of the archive that you found? (include the spaces in your answer)
2.2.0 20200918 Zerologon encrypted.zip