04 - Media Files and Digital Forensics

Class: CYBR-405


Notes:

Module Objectives

By the end of this module, you should be able to:

Images

Recognizing a Graphics File

Graphic files contain digital photographs, line art, three dimensional images, text data converted to images, and scanned replicas of printed pictures

Bitmap vs Vector

Pasted image 20260202093518.png|400

Understanding Metafile Graphics

Metafile graphics combine raster and vector graphics

Example
Scanned photo (bitmap) with text or arrows (vector)

Share advantages and disadvantages of both types
When enlarged, bitmap part loses quality

Standard graphics file formats

Common file formats

Understanding Graphics File Formats

Nonstandard graphics file formats

Audio and Video File Formats

Identifying Unknown File Formats

Viewing and Examining Media Files

Notes:

Examining the Exchangeable Image File Format

Notes:

EXIF (Exchangeable Image File Format)

Pasted image 20260202094312.png|300

Notes:

EXIF Information

Pasted image 20260202094423.png

Image Properties

Pasted image 20260202094531.png|700

Notes:

Understanding Data Compression

Notes:

Steganography

What is Steganogrpahy

Steganós + Graphia
(covered or concealed) + (writing)

Notes:

Steganography in Graphics Files

Inspect Images
Pasted image 20260202095041.png

Notes:

Pasted image 20260202095358.png|232

Can you tell the difference?
Pasted image 20260202095621.png|600

YouTube channel for CTF challenges: Marty Carlos

Notes:

Identify Media File Fragments

Repairing Damaged Headers

Notes:

Rebuilding File Headers

Before attempting to edit a recovered graphics file

Notes:

Cases

Twitter catches the w0rm(er)

The FBI busted "CabinCr3w" hacker and Anonymous hacktivist Higinio O. Ochoa III, aka "wOrmer," after he posted a photograph of his bikini-clad girlfriend holding handwritten taunts to the FBI. But it's what the photograph wasn't revealing that led to Ochoa's takedown, pleading guilty on hacking charges in June 2012, and subsequent 27month sentence in federal prison. Namely, the photograph had been snapped with an iPhone, and the feature to automatically add EXIF information, including GPS coordinates, to photographs hadn't been disabled. Furthermore, the EXIF data hadn't been expunged before being posted to Ochoa's "AnonwOrmer" Twitter account for the world to see.

Anti-Virus doesn't stop everything

Eccentric antivirus founder John McAfee, who was fleeing his home in Belize, where he was wanted for questioning in a murder investigation, had his location in Guatemala inadvertently revealed when Vice reporters traveling with him posted a picture of McAfee that included GPS-coordinate-revealing EXIF data. In short order, Guatemalan authorities arrested McAfee, who was ultimately returned to the United States.

Notes:

Selfie solves a murder

On March 24, 2015, 18 -year-old friends Cheyenne Antoine and Brittney Gargol from Saskatchewan, Canada posted a selfie on Facebook. They headed out for the night, but later, Gargol was found dead on the side of the road, with a belt nearby. While Antoine initially stated that Gargol left with a man she met that night, police determined that her story was untrue after looking at surveillance video. The selfie posted the night of Gargol's murder came into play when authorities noticed that Antoine was wearing a belt similar to the one found at the scene. Eventually, Antoine admitted to killing Gargol by strangling her with her belt during a drunken argument.

Summary


Scenario

University Police receive a disk image as digital evidence. Multiple student analysts examine the evidence and successfully identify the relevant artifact. However, questions are raised later about whether the findings would hold up in court.

Your task is to evaluate the scenarios below and determine which actions cause the most damage to the integrity and admissibility of the evidence.

Scenarios

Scenario A
A student mounts the disk image read-write by accident but quickly realizes the mistake. They still locate the correct artifact and document their findings.

Scenario B
A student runs a forensic tool that automatically modifies file timestamps within the mounted directory during analysis.

Scenario C
A student copies only the “interesting files” off the disk image and performs analysis on those copies instead of the full image.

Discussion Questions

In your group, discuss the following:

  1. Which scenario causes the most damage to the chain of custody and evidentiary integrity... and why?
    • Scenario B looks like the one that may cause the most damage since it actually messes up with the data (in this case it can be the logs or metadata timestamps of files), because of this, the integrity of the evidence is compromised.
  2. Are any of these scenarios recoverable from a legal or procedural standpoint?
    • Scenario A is more recoverable from a legal/procedural standpoint, because it just takes some permission changes and proper procedures in place to remediate the mount. It is still possible to prevent integrity compromise in this scenario.
  3. What is the minimum documentation or corrective action that could potentially salvage the findings?
    • There needs to be well established procedures when dealing with digital evidence artifacts. All of these mistakes need to be remediated in the possible measurement and logged correctly to keep track of exactly what has happened to the artifact. Student A needs to change the disk image mode to read only, student B needs to somehow look at a snapshot or back up of the artifact to see if its changes are recoverable, and Student C needs to perform analysis in the full image, as that would make the evidence more admissible.
  4. What would you do differently next time to prevent this issue entirely?
    • Next time, students need to follow proper procedures to deal with digital evidence. They must always safeguard the integrity of the artifact by keeping a chain of custody and ensuring the data does not get tempered with by unauthorized procedures or bad practices.