What Can You Discover from a USB Stick Found in the Grass?

  • Thread starter Thread starter Borek
  • Start date Start date
  • Tags Tags
    Usb
Click For Summary

Discussion Overview

The discussion revolves around a forensic challenge involving a USB stick found in the grass, where participants explore methods to identify the owner and reconstruct their story through digital traces left on the device. The conversation touches on technical aspects of file systems, operating systems, and the manipulation of file metadata.

Discussion Character

  • Exploratory
  • Technical explanation
  • Debate/contested

Main Points Raised

  • One participant describes a project involving a USB stick designed to simulate years of file transfers, emphasizing the importance of maintaining accurate file metadata such as creation, modification, and last access dates.
  • Another participant notes that on Windows, it is possible to write a program to alter file dates, suggesting this could be used in the forensic challenge.
  • Concerns are raised about the risks of picking up random USB drives, with references to malware like Stuxnet and devices like USB Killer that can damage hardware.
  • A participant mentions that while altering file dates is feasible on Windows, they found scripting the copying process easier on Linux, which only supports two of the three date types.

Areas of Agreement / Disagreement

Participants express varying views on the feasibility and risks associated with manipulating USB stick data, with some agreeing on the technical possibilities while others highlight the dangers of using unknown USB devices. The discussion remains unresolved regarding the best practices for handling such forensic challenges.

Contextual Notes

Participants acknowledge the complexities involved in maintaining convincing file metadata and the limitations of different operating systems in supporting file date manipulation.

Borek
Mentor
Messages
29,203
Reaction score
4,625
Some of the older forum regulars can remember my strange questions asked over two years ago about ways of stopping NTPD, freshmen may remember my questions about ways of expressing some things in English. As strange as it may sound all these questions were related to the same project. I got to the point where I can share the details.



So, what it is about? It is a forensic challenge - you are given a USB stick and you have to find out who the owner was and reconstruct their story. It requires some reading, some thinking, some common logic and some computer skills. A bit nerdy, but designed to be in range of a reasonably savvy computer user, no need for PhD in hacking.

I had plenty of fun designing whole thing and working around some of the unexpected obstacles. The idea was to make the stick look like if it was used for many years to transfer random files between computers. When the files are added, copied, removed, it all leaves invisible traces in the FAT and the directory structure - and to be convincing the stick needs to have all these traces intact. For example: files can have up to three dates - creation, last modification, last use. All these have to reflect the story and look convincing, and it is not trivial to do so, as OS tries to use real time and tries to get this real time from the net using NTP, so I had to ether somehow block the clock and NTPD, or use a computer that was isolated form the outside world. And that's only a simple example of problems I had to solve, I learned more about some intricacies of different OS-es and structures of different types of files than ever before. Actually I am not 100% sure I haven't missed something, although so far nobody told me about any inconsistencies.

If I had plenty of fun making it, judging from the reaction to the Polish version people have plenty of fun looking for answers.

Fell free to add the add the TUSFitG to your Steam wishlist if you have one, after all that's why I am posting about it :wink: Yes, Greg knows.
 
  • Like
Likes   Reactions: hutchphd, DennisN, Drakkith and 1 other person
Computer science news on Phys.org
Just so you know, if you are running under Windows you can write a simple program to change any of the 3 dates to whatever you want.
 
mfw picking up random USB drives: do you want stuxnet? that's how you get stuxnet.
 
Pythagorean said:
mfw picking up random USB drives: do you want stuxnet? that's how you get stuxnet.

And with USB Killer you just fry the motherboard.
 
phinds said:
Just so you know, if you are running under Windows you can write a simple program to change any of the 3 dates to whatever you want.

Yes, that's how I did another part of the project, but scripting the copying part was much easier to implement under Linux, and Linux basically supports only two of these dates.
 
Just launched :smile:

 

Similar threads

Replies
14
Views
2K
  • · Replies 36 ·
2
Replies
36
Views
5K
  • · Replies 14 ·
Replies
14
Views
4K
Replies
7
Views
3K
  • · Replies 60 ·
3
Replies
60
Views
8K
  • · Replies 3 ·
Replies
3
Views
2K
Replies
2
Views
2K
  • · Replies 6 ·
Replies
6
Views
2K
  • · Replies 6 ·
Replies
6
Views
7K
Replies
15
Views
11K