In this blog post, we will be solving a challenge designed by Cyber Defenders using the full version of ArtiFast Windows. In this case, the SOC team detected an illegal port scanning activity coming from a disgruntled employee's system who might be getting help from an outsider (full scenario). The purpose of this challenge is to analyze the image provided and confirm or deny the theory claimed. Below is the solution to the challenge, solved using the full version of ArtiFast.
        The answer can be found in Computer Name  artifact under the
        Registry category. The computer name is  4ORENSICS . 
         
      
        The answer can be found in Profiles List artifact under the
        Registry category. The computer SID is
         S-1-5-21-2489440558-2754304563-710705792. 
         
      
        The answer can be found in System Information artifact under the
        Registry category. The operating system version is
         Windows 8.1 Enterprise. 
         
      
        The answer can be found in Timezone Information artifact under
        the Registry category. The computer timezone is  UTC-07:00.
        
         
      
        The answer can be found in User Accounts artifact under the
        Registry category. The user Hunter logged in to the computer
         3 times . 
         
      
        The answer can also be found in User Accounts artifact under the
        Registry category. The last login time for the user Hunter is at
         2016-06-21 01:42:40. 
         
      
        The answer can be found in UserAssist artifact under the Registry
        category. As can be seen in the picture below, zenmap was running
        on the computer and the last time the suspect used it was at
        2016-06-21 12:08:13. 
         
      
        The answer can be found within nmapscan.xml file which is located on
        Hunter’s desktop.
        
         
        
        To access nmapscan.xml file, switch to file view and then, navigate to
        the file. By right clicking on any file, you can view it as text, image,
        audio, video or pdf depending on the type of the file. The file will
        open on the window in the rightmost side of the screen and you can
        extract and save these files.
        
         
      
        The answer can also be found in  nmapscan.xml  file. The user
        Hunter used the command nmap -T4 -A -v scanme.nmap.org  which
        means that 1000 ports  were scanned. 
         
      
        The answer can also be found in  nmapscan.xml  file. As can be
        seen in the picture below, the ports
        22, 25, 26, 80, 9929 and 31337  were found open. 
         
      
        The answer can also be found in  nmapscan.xml  file. As can be
        seen in the picture below, the version of the network scanner running on
        the computer is (7.12). 
         
      
        The answer can be found in  Skype Text Messages  artifact under
         Instant Messaging  category. The employee exchanged several
        messages with a user named Linux rul3z. 
         
      
        The answer can also be found in  Skype Text Messages  artifact.
        As can be seen in the picture below, the employee and the external
        attacker agreed on using Team Viewer. 
         
        
        For the second part of the question, the answer can be found in
         UserAssist  artifact under the Registry  category. As can
        be seen in the picture below, the suspect ran Team Viewer at
        2016-06-21 12:00:43. 
         
      
        The answer can be found in  Skype Accounts  artifact under
         Instant Messaging  category. The email address of the suspect
        employee is  ehptmsgs@gmail.com . 
         
      
        To find the file, switch to file view and then, navigate to the
        documents' directory. You can view all the pdf files by right clicking
        on any of them. As can be seen in the picture below, the name of the
        file discussing data exfiltration techniques is
         Ryan_VanAntwerp_thesis.pdf. 
         
      
        The answer can be found in  USB Forensics artifact under
         OS  category. The serial numbers of the two identified USB
        storage are 07B20C03C80830A9 and AAI6UXDKZDV8E9OU.
        
         
      
        To find the application, switch to file view and then, navigate to
        program file (x86). As can be seen in the picture below, the name of the
        application is  Jetico BCWipe. 
         
      
        As can be seen in the picture below, the number of prefetch files
        that were discovered on the system is (174). 
         
      
        The answer can be found in  Prefetch  artifact under
         OS  category. The file shredder application was executed
        5 times. 
         
      
        As can be seen in the picture below, ZENMAP.EXE-56B17C4C.pf was
        last executed on June 21, 2016 at 12:08:13 PM. 
         
      
        The answer can be found in  Outlook PST/OST  artifact under
         Email  category. As can be seen in the picture below, the name
        of the attachment is  Pictures.7z. 
         
      
        As indicated in the question, the answer can be found in
          Shellbags
        
        artifact under  OS category. The full path to the folder is
         C:\Users\Hunter\Pictures\Exfil  
         
      
