I have been interested in Information Security for about 12 months and I’ve studied pentesting/Computer Forensic (CF) off and on for about the same time. After researching Info Security careers like so many of us do, I knew it would be difficult to get into the field without a good amount of I.T. experience, so I decided to look into internships. Roughly three months ago, I was lucky enough to land a computer forensic internship through a friend.
Over the past couple of months, I have read a lot about people wanting to get into CF field but there are so FEW articles/blogs/threads regarding someone’s experience in the field, so I decided to write a review of my experience as a Junior Computer Forensic Analyst.
Before I start talking about my experience, I would like to give you my opinion of the field before I started.
- After reading the 20 coolest Info Security jobs and noticing 2 of the top 3 jobs were CF jobs, who would not think CF was a badass job? The job just sounds “sexy”; going through someone’s computer to solve an investigation or just trying to find something on a computer that someone is trying to hide.
- I have read on a couple of forums about how Info Security involves a lot of writing and that the career is not as “sexy” as people would think. I personally wouldn’t mind writing reports and I really thought people were trying to say the job wasn’t “sexy” because they didn’t want more people entering their field.
Now onto my internship:
I met my mentor (I will call him Mr X.) in late March and he’s one of the nicest guys I have ever met. He’s been in the CF field for 13-15 years and he was also one of the 1
st individuals trained by the government to do CF work. Not only did he have years of experience but he’s one of those people who enjoys teaching and passing on his experience/knowledge.
I ended up doing the internship for about 2 months and I had about 4-6 different cases. I had cases involving;
- A wife wanting to know if her husband was cheating
- A Lawyer wanting to know if his ex-employees stole important documents and put malware on his computer
- A Christian woman wanting to know if her husband has been viewing ****
- A guru from India had a sex tape leaked onto the internet and we had to confirm if the video had been altered in any way and if in fact it is the guru in the video
- An employee left company A for company B (which was a competitor) and Company A was suing the ex-employee for stealing client information from their computer days before he left Company A.
Here were the basic steps we took in completing a case
- Meet the client
- Ask the basic questions and take notes; what/where/why/who/how
- Have the client surrender the equipment they would like us to check out. If the equipment was for a court case, we needed to make sure we had the proper court documents before accepting the equipment.
- Image hard drive
- Bookmark all possible evidence (use forensic tools; FTK, EnCase, FTK registry,etc..)
- Go through everything you bookmarked in detail and see what you find
- Create a report with everything you found
Now I would like to go into one of the cases in greater detail, so everyone can see what the job is actually like. I will describe the case involving the lawyer who thought his ex-employees deleted/stole important documents and put malware on his computers.
We met the Lawyer; listened to his story, asked questions, and took notes. Then he handed over his 3 computers and we took it back to the lab where we imaged the hard drives using a write blocker (which was my 1
st time using such a device, which was cool), and then mounted the hard drive into Encase. I took the next 7 hours bookmarking “all possible pieces of evidence”, which was literally any .doc or .pdf file deleted in the last 2 months (I bookmarked over 1,000 items). Just to explain bookmarking a little more, it’s like looking at a never ending Word documents that has a whole bunch of random letters and numbers mixed in with documents. This is an example of what you’ll be looking at when you’re bookmarking:
ggfgddjdfy876fs87f6687hj9hjhjh7jh8jh97n87hn79g7g97b9g7h97r987r9t7e87e9r78r7e9r7e9r7e987r9e............////::::

????///
hjsdjsd44348374837:://fjhsjkhkjdsdhk34873fdhfkjjkhsdjkhsdhsdksd364374364736437846487637864374634783746374368473fkjhfjkshskjdhsdhsdhsdhsk739847398473498374934873skhsdkjshjdhsdjkhdkjdhs29387298323983983892287929829833//::
customer_acct_info_2006.pdf.////83493748hjhdkdhdhs834
/customer.account.information.2006.gfgfgfgfgfgfgfgfgfgjjhjhjhjhjj/
/john.smith.123457894.1512.main.st.credit.card.number.4563.2356.2584.4569./ggfgffg54544545454545454555454554ffffffff7f97df98d7dfds7fds8f97f98d7f89df7d9f7d89f7dfd7fd9f7df9s7fd9f7d9fd7f9df//fgfg/g/gf/f/f4445554545//fdf///7498343437843894734893743894739483748hjhjskhdjshdsjhdskjhdskjdhskdshdsdhskdjshdkjshdskjdhsdkjsdkjshdskjdhsjkdhskjdhskdshdskjdkjdkdskskjsh4j5k4j4k35g45k43hg54h5kg45j43f54fk45ghg5jgk54kg54g535k35g45gk4543g54kh5g35kgk354k5gkgk345g45k5g4k
You can obviously see where the document begins and ends but doing this for 7 hours makes you want to smash your head against the sidewalk. After THAT, I took another 7 hours going through all 1,000 items that were bookmarked. Then I assisted Mr. X with writing a report with our findings. Finally, we met with the client one more time to let him know what he found but since we did not find evidence that supported what he was looking for, he become angry and said we didn’t do our job. And from what Mr. X said, a lot of the time, client’s will get mad if you don’t find the “information” that they
thinks is on the computer.
I can honestly say the only interesting part of the whole case was the initial meeting with the client; listening to their story, asking questions, and taking notes. Everything after that was extremely boring, which was literally 95% of the job. I knew almost right away after I started bookmarking, that this career was not for me. Depending on the size of the hard drive, I could have been bookmarking for another 7 hours! I am so lucky I was able to have this experience before I possibly started a CF degree, classes, or even certifications. I definitely feel like most schools/websites build this career up to be something it is totally not. Hey, if you don’t mind staring at a computer screen scrolling through data/info for 80-90% of your job, then all the power to you but I definitely wouldn’t. I honestly can say I like my NOC job twice as much as CF. Don’t get me wrong, you could get an interesting case every now and then, but 90% of time it won’t be too interesting.
I respect the CF profession and all CF professionals but after reading so many posts about individuals wanting to get into CF and spending thousands of dollars on certifications/classes without ever doing CF work, I just want them to hear what my experience was like. BUT AGAIN, THIS REVIEW IS JUST MY OPINION...take it for what it's worth.
After learning the hard way with CF and how some careers are not what they seem, it definitely makes me question what a Pentesting career would be like…
*****I probably left out some important stuff, so if you have any questions…just ask and I’ll be happy to answer them.