Create a file-system-based timeline

Assignment Help Computer Engineering
Reference no: EM131688373

Lab: Evidence Acquisition and Analysis Lab

For this lab, you will practice acquiring a digital image of your own laptop or computer and setting up a forensic analysis workstation. You will NOT have to turn in the image of your own laptop (for privacy reasons), but you will have to turn in evidence that you have completed this task. For all the required information that needs to be turned in, a Word document is sufficient.

For this exercise, you will need to do the following:

Download a Linux-based forensics live CD.

Use this to acquire the harddrive on your own computer by booting into the LiveCD and then storing an image file on a portable hard drive. You can use any of the commandline-based acquisition tools you like (recommended to us: dcfldd for on-the-fly hashing).

Take an MD5 and SHA256 hash of the drive before AND after you do the acquisition; turn these in. If you use a program that has on-the-fly hashing, turn that in as well. Compare your results to the hash of the image file; ensure that they match.

Describe how you ensured that the drive you were acquiring was not modified during the acquisition.

During the running of the hashing algorithms, I made sure nothing was running in the background or open except for the hashing program itself. If I was in the field I would also use a write block to make sure there definitely was no modification and keep the data untouched.

On your laptop, install the virtualization software of your choice to create a forensics workstation. Ideally this would be dedicated hardware, but use your own device. It is recommended you install the SIFT Kit, but any other Forensic distro will do.

Using Autopsy, load the image into a new case and verify that the hashes still match.

Create a file-system-based timeline and turn in the first 10 and last 10 entries as well as the hash value of the file.

In Autopsy, perform a keyword search for the name of your university; how many files were returned that matched? (Just provide the count, not the filenames or their contents.)

Attachment:- Assignment File.rar

Reference no: EM131688373

Questions Cloud

What warner brothers do to ensure successful repatriation : The director of sales and marketing for a Warner Brothers theme park has been working in Madrid. She is getting ready to return to the United States.
Discuss component of network transportation : What is the answer to this question and what are three main points that I can talk about in my essay
Operate within the time and budget constraints : Proper scope identification and management will help the project evolve smoothly and operate within the time and budget constraints.
Describe illegal immigrants should be provided a path : Describe illegal immigrants should be provided a path for citizenship. Pay fines, learn English, obey the laws and wait your turn to considered for citizenship.
Create a file-system-based timeline : Create a file-system-based timeline and turn in the first 10 and last 10 entries as well as the hash value of the file
Monopolistically competitive : Think of an industry that is close to being purely competitive and compare it with another industry of your choice that is monopolistically competitive.
Discuss steps in developing a succession planning system : List and discuss the steps involved in developing a succession planning system. How might a succession planning system differ between high-potential employees.
Reconstruct and analyze monetary : Reconstruct and analyze monetary The Mexico Peso Crisis. what the effect was, what impact it had on trade and on living conditions in the country.
Hire workers under a matching strategy : What is the total cost to hire workers under a matching (chase) strategy?

Reviews

Write a Review

Computer Engineering Questions & Answers

  Develop a fsm for entering a security code into an atm

Construct a finite-state machine for entering a security code into an automatic teller machine (ATM) that implements these rules.

  What are two merits and two challenges which might be faced

based on the barr 2013 article what are three possible ways that streaming media can be used to accomplish the

  Manage the threat, the risk, the disaster

Does one manage an imminent disaster or respond to it? Take a tornado, for example. Is this an imminent disaster waiting to happen? Do you manage the threat, the risk, the disaster or all three.

  How to open microsoft word and paste the information

In this assignment, you will find out and critique virtual information and word processing skills to make a professional-looking document that promotes personal development or financial growth and maturity.

  How the total number of nodes considered

Explain how the total number of nodes considered during the search could be reduced by conducting two searches at the same time-one beginning at the initial state while the other searches backward from the goal- until the two meet.

  Design pic based system to measure power absorb by resistor

Design a PIC18F4321-based system to measure the power absorbed by a 2K resistor (Figure). The system will input the voltage (V) across the 2K resistor.

  What can be done to minimize the errors

Where are the majority of defects found in a final program introduced? What can be completed to minimize these errors.

  Perform normalization process to convert un-normalized table

Perform the normalization process to convert the above un-normalized table to First normal form (1NF) Second normal form (2NF) and Third normal form (3NF).

  As you learn more about disk storage options for the web

assume you are planning web server computer capacity for a business that has 5000 business customers and sells about

  Implementation of memory management

Assignment covers the following eight topics and explore the implementation of memory management, processes and threads.

  How could usability be determined

Locate two Web sites that you feel exhibit exemplary design features. define why you selected each site. What design features stand out on each site? Are these features unique to the Web sites you selected or are they used by their competitors or s..

  Assignment program crawler game

Assignment program Crawler game: Update the Crawler game attached to allow a user to traverse the Cave. They should be prompted in each room to pick an exit or quit

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd