| (Forensics: 
WinAudit Lesson 1){ System Inventory } 
 
			
				| Section 0: Background 
				Information |  
	Background
		WinAudit is a great free tool, that will give 
	you a comprehensive view of the components that make up your system, 
	including hardware, software and BIOS. 
	Lab 
	Notes
		In this lab we will do the following:
			Download WinAudit.Install WinAudit.Create Audit ReportInterrogate Audit Report Sections. 
Legal Disclaimer
		As a condition of your use of this Web 
		site, you warrant to computersecuritystudent.com that you will not use 
		this Web site for any purpose that is unlawful or 
		that is prohibited by these terms, conditions, and notices.In accordance with UCC § 2-316, this 
		product is provided with "no warranties, either express or implied." The 
		information contained is provided "as-is", with "no guarantee of 
		merchantability."In addition, this is a teaching website 
		that does not condone malicious behavior of 
		any kind.You are on notice, that continuing 
		and/or using this lab outside your "own" test environment
		is considered malicious and is against the law.© 2012 No content replication of any 
		kind is allowed without express written permission.   
			
				| Section 1: Power On 
				Damn Vulnerable WXP-SP2 |  
	Start VMware Player
		Instructions
			For Windows 7
				Click Start ButtonSearch for "vmware player"Click VMware PlayerFor Windows XP
				Starts --> Programs --> VMware 
				Player  Start Up Damn Vulnerable WXP-SP2.
	
		Instructions: 
		
			Click on Damn Vulnerable WXP-SP2 
			Click on Edit virtual machine Settings 
			Note(FYI): 
		
			For those of you not part of my class, 
			this is a Windows XP machine running SP2.   Edit Virtual Machine Settings
	
		Instructions: 
		
			Click on Network Adapter Click on the Bridged Radio button 
			Click on the OK Button    Play Virtual Machine
	
		Instructions: 
		
			Click on Damn Vulnerable WXP-SP2 
			Click on Play virtual machine 
			   Login to Windows
		Instructions:
			Click on AdministratorType your password: 
			<Supply Password>  Open a Command Prompt
	
		Instructions: 
		
			Start --> All Programs --> Accessories 
			--> Command Prompt   Obtain Damn Vulnerable WXP-SP2's IP Address
	
		Instructions: 
		
			ipconfig Note(FYI): 
		
			In my case, Damn Vulnerable WXP-SP2's 
			IP Address 192.168.1.116. In your case, Damn Vulnerable WXP-SP2's 
			IP Address might be different.     
			
				| Section 2: Download 
				and Install WinAudit |  
	Open Firefox
	
		Instructions: 
		
			Start --> All Programs --> 
			Mozilla Firefox  Download WinAudit
	
		Instructions: 
		
			Navigate to the below URL.
				http://www.computersecuritystudent.com/FORENSICS/Windows/Miscellaneous/lesson1/WinAudit.zipClick Save File Radio ButtonClick the OK Button  Save WinAudit
	
		Instructions: 
		
			Navigate to Desktop --> My Documents 
			--> DownloadsFile name: WinAuditClick the Save Button.  Download complete
	
		Instructions: 
		
			Click Tools --> DownloadsRight Click on WinAudit.zipOpen Containing Folder  Extract All...
	
		Instructions: 
		
			Right Click on WinAudit.zipClick on Extract All...  Extraction Wizard
	
		Instructions: 
		
			Click the Next Button  Select Folder
		Instructions: 
		
			Click the Next Button  Successfully Installed
		Instructions: 
		
			Click the Finish Button   
			
				| Section 3: Download 
				and Install WinAudit |  
	Install Winaudit
		Instructions: 
		
			Navigate to C:\tools\winauditRight Click on WinAudit.exeClick on Open  Open File - Security Warning
		Instructions: 
		
			Click the Run Button   
			
				| Section 4: Audit 
				Your Computer |  
	Audit Your Computer
		Instructions: 
		
			Click on Here (See Below).   
			
				| Section 5: System 
				Overview |  
	System Overview
		Instructions:
			Click on System Overview.   
			
				| Section 6: Installed 
				Software |  
	Click on Installed Programs
		Instructions:
			Go To: Installed Software --> Active SetupNote(FYI):
			Notice you will see a list of programs.There will be a matrix for each program 
		that will contain: Name, Vendor, Version, etc.   
			
				| Section 4: Security 
				Settings |  
	Internet Software
		Instructions:
			Go To: Security --> Internet SoftwareNote(FYI):
		  Open Ports
		Instructions:
			Go To: Security --> Open PortsNote(FYI):
			For each open port listed below, a 
			table of information will display the following data:  
			Protocol, Address, Name, Connection State, Process Name, 
			Manufacture, etc.  Security Settings
		Instructions:
			Go To: Security --> Security 
			SettingsNote(FYI):
			Below you can see various basic 
			security settings: Screen Saver, Password Length, Password Age, 
			Internet Explorer, etc.Notice the following issues: (1) the 
			screen saver password is not set, (2) automatic updates are turned 
			off, (3) minimum password length can be set to nothing, (4) lockout 
			attempts are disabled, (5) ActiveX is allowed, etc.    Shared Permissions
		Instructions:
			Go To: Security --> Shared 
			PermissionsNote(FYI):
			Below there are three folders that are 
			shared: (1) ADMIN$, C$, and IPC$.The entire Hard drive is shared out to 
			everyone.  Windows Firewall
		Instructions:
			Go To: Security --> Windows FirewallNote(FYI):
			Notice that the Firewall is not 
			enabled.  In addition, both Remote Assistance and Remote 
			Desktop are enabled.   
			
				| Section 5: Running 
				Programs |  
	Running Programs
		Instructions:
			Go To: Running ProgramsNote(FYI):
			This section produces a list of running 
			programs.Notice that both telnet and vnc are 
			running.  Telnet is susceptible to sniffer attacks.  VNC 
			could be a problem if authentication is not set.   
			
				| Section 6: Hardware 
				Devices |  
	Hardware Devices
		Instructions:
			Go To: Hardware DevicesNote(FYI):
			Notice under the Hardware device tree 
			their is a list of devices and peripherals.For a Forensics investigation, you will 
			need take physical pictures of all peripheral devices attached to 
			the computer.  Then you will need to collect a software 
			inventory, like below, where you record the device type, 
			description, manufacture, driver version, etc.   
			
				| Section 7: Save the 
				WinAudit Report |  
	Save WinAudit Report
		Instructions:
			Go To: File --> Save  Saving
		Instructions:
			Navigate to
			Desktop -->
			My DocumentsFilename: WXPSP2-20121219
				Remember to change your date, where 
				the format is YYYYMMDD.  (YYYY = year, MM = month, DD = 
				day).Save as type: CSV
				I chose CSV (Comma Separated Value) 
				because this format can easily be parsed into stuffed into a 
				database in a hurry.Click the Save Button   
	Open a Command Prompt
	
		Instructions: 
		
			Start --> All Programs --> Accessories 
			--> Command Prompt   Proof of Lab
		Instructions:
			cd "My Documents"dir WXPSP2-20121219.csv
				Remember that your filename will 
				probably be different.date /techo "Your Name"
				Replace the string "Your Name" with 
				your actual name.e.g., echo "John Gray"
		
		Proof of Lab Instructions
			Press both the <Ctrl> and <Alt> keys at 
			the same time.Do a <PrtScn> Paste into a word document Upload to Moodle   | 
    
 
  
		
		
		 |