Skip to content

Commit 13968ae

Browse files
authored
Add files via upload
1 parent 8180c01 commit 13968ae

File tree

1 file changed

+167
-0
lines changed

1 file changed

+167
-0
lines changed

forensic_assignments.md

Lines changed: 167 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,167 @@
1+
# 🧪 Digital Forensics Assignments - Markdown Report Instructions
2+
3+
Welcome to the **Digital Forensics Lab**. Each task below must be completed independently and uploaded to your GitHub repository.
4+
5+
## 📂 Repository Structure
6+
**Repository Name:** `my-DF-Notes`
7+
8+
**Directory Layout:**
9+
```
10+
my-DF-Notes/
11+
├── exiftool-analysis/
12+
│ ├── report.md
13+
│ ├── Forensics-image.png
14+
│ └── screenshots/
15+
├── virustotal-scan/
16+
│ ├── report.md
17+
│ ├── malware_sample.zip
18+
│ └── screenshots/
19+
├── villain-reverse-shell/
20+
│ ├── report.md
21+
│ └── screenshots/
22+
```
23+
24+
---
25+
26+
## 📸 Assignment 1: ExifTool Image Analysis
27+
28+
### 🔗 Resources
29+
- Image to analyze: [Forensics-image.png](https://github.com/sector21/DigitalForensicsNotes/blob/main/resources/Forensics-image.png)
30+
31+
### ✅ Task
32+
Analyze the metadata of the given image using `exiftool`. Document your findings in a markdown file.
33+
34+
### 📄 Your `report.md` Should Contain:
35+
```markdown
36+
# ExifTool Metadata Analysis Report
37+
38+
## 🔎 Image Overview
39+
- Filename: Forensics-image.png
40+
- File Size: _value_
41+
- Image Dimensions: _value_
42+
43+
## 📸 Camera Info
44+
- Make: _value_
45+
- Model: _value_
46+
47+
## 🌍 Geolocation (If Available)
48+
- GPS Lat/Long: _value_
49+
- Maps Link: [Google Maps](link)
50+
51+
## 🕐 Timestamps
52+
- DateTimeOriginal: _value_
53+
- ModifyDate: _value_
54+
55+
## 📝 Software/Comments
56+
- Editing Software: _value_
57+
- Comment Field: _value_
58+
59+
## 🔐 SHA256 Hash
60+
- `your calculated hash`
61+
62+
## 🧠 Inference
63+
Is the image original? Any signs of manipulation?
64+
65+
## 🖼️ Screenshots
66+
Embed terminal outputs from `exiftool`. Highlight critical sections.
67+
```
68+
69+
---
70+
71+
## 🦠 Assignment 2: VirusTotal File Analysis
72+
73+
### 🔗 Resources
74+
- ZIP File (Password: `infected`): [malware_sample.zip](https://github.com/sector21/DigitalForensicsNotes/blob/main/resources/Forensics-image.png)
75+
76+
### ✅ Task
77+
Upload the sample to [https://virustotal.com](https://virustotal.com), analyze the scan results, and document key findings.
78+
79+
### 📄 Your `report.md` Should Contain:
80+
```markdown
81+
# VirusTotal Analysis Report
82+
83+
## 📁 File Info
84+
- Filename: malware_sample.zip
85+
- File inside: malware_sample.docx
86+
- Hashes:
87+
- MD5: _value_
88+
- SHA1: _value_
89+
- SHA256: _value_
90+
91+
## 🧪 Detection
92+
| Engine | Detection |
93+
|--------|-----------|
94+
| ExampleAV | Trojan.Macro.Gen |
95+
96+
## 📡 Network Indicators
97+
- Domains, IPs flagged
98+
99+
## 📊 Behavioral Summary
100+
- Sandbox behaviors (if any)
101+
102+
## 🗣️ Community Insight
103+
- Votes, user comments
104+
105+
## 🔐 Public Link
106+
- [VirusTotal Public Scan Link](link)
107+
108+
## 🖼️ Screenshots
109+
Include screenshots of your logged-in VT dashboard and scan results.
110+
```
111+
112+
---
113+
114+
## 🖥️ Assignment 3: Villain Framework Reverse Shell
115+
116+
### ✅ Task
117+
Use Villain to simulate a reverse shell attack on your own VM setup. Do **not** use this on real systems or others' devices.
118+
119+
### 📄 Your `report.md` Should Contain:
120+
```markdown
121+
# Villain Framework Reverse Shell Report
122+
123+
## ⚙️ Setup Info
124+
- Payload: `windows/reverse_tcp/powershell`
125+
- LHOST: _your IP_
126+
- LPORT: _your port_
127+
128+
## 🔁 Payload Delivery Method
129+
- Describe how you executed it on the target VM.
130+
131+
## 🖥️ Captured Info
132+
- Hostname: _value_
133+
- IP Address: _value_
134+
- User: _value_
135+
136+
## 🔎 Enumeration Performed
137+
```powershell
138+
whoami
139+
ipconfig
140+
systeminfo
141+
```
142+
143+
## 🛑 Final Verification
144+
Take a screenshot **without executing**, showing you typed in the villain framework shell:
145+
```powershell
146+
echo "https://github.com/<your-github-username>"
147+
```
148+
149+
## 🖼️ Screenshots
150+
Villain shell, session start, IP logs.
151+
```
152+
153+
---
154+
155+
## 📌 Final Notes
156+
- All `report.md` files **must be written in Markdown**.
157+
- Place screenshots in a folder named `screenshots/` inside each assignment directory.
158+
- Do not reuse answers. Every submission is validated with logs, screenshots, hashes.
159+
- Deadline and submission link will be announced in the classroom.
160+
161+
---
162+
163+
If you face any issues, reach out in github by making a issue in the github repo.
164+
165+
166+
Happy Hacking! 🕵️‍♂️
167+

0 commit comments

Comments
 (0)