1. Examination of Extracted Data Tools : FTK Imager. Procedure : Open FTK Imager, add the evidence...
Fantastic news! We've Found the answer you've been seeking!
Question:
1. Examination of Extracted Data
- Tools: FTK Imager.
- Procedure: Open FTK Imager, add the evidence item ismart_00.img from the specified folder. Examine the first sector for a file system.
- Documentation: Take a screenshot of the data in FTK Imager. Note whether a recognizable file system is present.
2. Analysis of Firmware and Exploitation Script
- Reference: GitHub repository detailing the exploit.
- Procedure: Understand that the data is part of the device's firmware. Review the script ismart_alarm.py which has been executed to extract data.
- Data Analysis: Explore server_stream JSON files in sample1 and sample2 folders.
3. Decoding and Understanding JSON Data
- Tools: CyberChef and Firefox's JSON viewer.
- Procedure: Use CyberChef to decode the server_stream_door_events.json and other JSON files. Drag these files into Firefox to view larger datasets.
- Analysis: Focus on fields like "TS" (timestamp) and interpret the data.
- Documentation: Provide screenshots and document your findings, highlighting actionable insights for an investigator.
4. Identifying the iSmartAlarm Device in Network Traffic
- Tools: Network Miner.
- Procedure: Open ismartalarm.pcap file. Use the picture of the device's MAC ID to identify the iSmartAlarm device's IP address on the network.
- Documentation: Determine and document the internal IP address of the iSmartAlarm device.
5. Analysis of Network Traffic
- Procedure: In Network Miner, use the Files and Session tabs to filter data related to ismartalarm.
- Analysis: Identify the types of files associated with ismartalarm. Document all external IP addresses connected to the iSmartAlarm and note any peculiarities.
- Follow-up: Suggest follow-up actions based on interesting findings, particularly regarding the unique IP address identified.
6. Conclusion
- Insight: Acknowledge the complexity and challenges in examining IoT devices compared to traditional computers or mobile devices.
- Summary: Conclude with the multifaceted approaches required to understand IoT device behavior.
Related Book For
Income Tax Fundamentals 2013
ISBN: 9781285586618
31st Edition
Authors: Gerald E. Whittenburg, Martha Altus Buller, Steven L Gill
Posted Date: