Loading...

Messages

Proposals

Stuck in your homework and missing deadline? Get urgent help in $10/Page with 24 hours deadline

Get Urgent Writing Help In Your Essays, Assignments, Homeworks, Dissertation, Thesis Or Coursework & Achieve A+ Grades.

Privacy Guaranteed - 100% Plagiarism Free Writing - Free Turnitin Report - Professional And Experienced Writers - 24/7 Online Support

Imaging and hashing digital evidence

05/12/2021 Client: muhammad11 Deadline: 2 Day

UMGC INFA650 Computer Forensics Lab 1

Forensic Imaging and Hashing In your virtual lab desktop environment, you will create a forensic image and use hashing to verify it’s authenticity. The use of hashes is a methodology that is highly respected and used when presenting evidence and reports in a court of law. It is important to understand the role of a Digital Forensic analyst includes using tools to capture and analyze digital evidence as well as report out what you found, how you found it, and verify the information. Utilize online guides (you will need to Google for these – YouTube is also a very good resource)--to create a bitwise forensic image of the Lab1 file in the appropriate folders (in the Lab Resources folder on the Virtual Machine (VM)) using the forensic tool FTK_Imager. You will document and discuss the steps you took in the lab, and then answer the lab questions found at the end of the document. Virtual Machine Credentials Username: StudentFirst Password: Cyb3rl@b

Important Points to Remember 1. Discussing and illustrating the process is the most important part of this lab. Make

certain you intersperse your screenshots within the discussion and label them appropriately.

2. You must complete this lab within your virtual machine environment. Remember that the image may reset when you log off, so be sure you complete the steps for one of the images and take your screenshots (saving them outside of the VM to your host system) before logging out.

3. Use the Windows Snipping tool to take a screenshot of the appropriate Windows and not the entire desktop.

4. Microsoft Office is installed within your VM within the VCL. You can to create your PDF file.

5. All labs have a set due date and time. Labs can be turned in up to a week after the due date and time, but with a penalty for each day it is late.

6. As we progress through the labs for this course, the virtual environment will keep your work from prior labs, so you may need to destroy nodes or clear you cache to enable smoother connections.

Deliverable Filename: lastname-lab1.pdf (this is how you should title your lab report submission) In the dropbox folder under Lab1, submit your documentation via a PDF document with your last name and page number at the bottom right of each page. Use an appropriate filename: yourLastName-Lab1.pdf. Using pdf format ensures that screenshots will be visible, as it is common for other formats to lose graphics.

Preliminary Steps Launch the UMGC virtual environment by following the “Accessing the Virtual Lab Environment” instructions. Instructions can be found under Content > Session 3: Computer Investigations > Accessing Lab 1. 1. Start the Windows virtual machine and open resources. If this is the first time in the environment, or you have cleared your browser cache, you will need to first click on Nodes:

Once the Nodes are launched, click on Allocate Lab > Connect:

If you see the pop-up asking about PowerShell, click on Open Windows PowerShell:

If you see a security pop-up, check “Don’t ask me again for connections to this computer” and click Connect:

Enter credentials, check the box next to “Remember me”, and click OK:

Virtual Machine Credentials Username: StudentFirst Password: Cyb3rl@b

Lab 1 Description In this lab, you will be conducting Forensic Imaging. We will use a common tool, FTK Imager, to image a directory folder on your machine. Typically, Computer Forensic Investigators will image (i.e. make a bit-by-bit copy) a whole drive to make a duplicate of it. Once they have a copy of a drive, they can use tools and techniques to analyze folders, files, and fragments of data for digital evidence. For this lab, we only want to image a single directory folder and its contents due to time and space constraints. Over the next few steps, you will select to image a disk directory, choose the directory in the tool interface options, and then select the output of that image. You will then mount the resulting image and explore its contents to verify that it was in fact a captured image of the directory you had specified. This final step in verification is extremely important to the integrity of any investigation.

Part I Steps 1. Now that you are in the virtual environment, start by accessing and downloading the file to be imaged. From the desktop go to Lab Resources > Project Resources and click to open and download the file Lab1.exe.

2. Click once on “Lab1.exe” and then go to the right of the address bar of the browser window, and right-click on the three cascading dots to get a dropdown menu. Locate and click on Downloads:

3. If you get this message, click Keep:

And then Keep anyway (remember, this is a virtual machine, so your machine is safe):

To view where your downloaded file is saved, click on Show in folder. Note the full address of the location of this file – you will need it in later steps.

You can close and return to the Desktop > Lab Resources.

Part II – Image a Directory File 1. On the virtual desktop, open Lab Resources > Applications > FTK Imager. This is the Digital Forensic tool we will use for this Lab:

2. Select the View tab > Evidence Tree:

3. To make all drives and folders visible, go to File and select Add All Attached Devices:

4. Once ‘All Attached Devices’ are loaded, the system will scan the MFT for all files and folders. At this point in the investigation, you can choose any folder or files under the Evidence Tree to image. For this lab, we will select a picture that is in a system directory and alter the original. In a DF investigation, this process would illustrate the originality of the picture through both file contents and hashing (which we do in Lab #2). Now, select a picture from the ‘Sample Pictures’ folder using the path C > NTFS > root > Users > Public > Pictures > Sample Pictures:

You can see file information in the File List window, including size of file, type, and last date modified. At this point you could use the FTK Imager to image a drive, however as we are limited in available storage space, we will complete the imaging process and verification with a file.

5. For this lab, you need to capture an original picture file and its corresponding hash report. To do this, choose a picture and right click to both save the image and hash file to your machine.

6. Next, open the image file you saved, alter the image and save this new file to your machine. 7. Finally, you should have 4 files saved to your virtual desktop; the original picture, the altered pictured, and the two hash files corresponding to the two pictures.

Lab Report In the Lab Report that you will submit for this lab, you need to document the steps you took, the original picture file you selected and altered, and compare the File Hash Lists for the two picture images. Be sure that you have met the following expectations:

• Capture screen shots of each step. • Include the File Hash List for both picture images.

Part III – Image an Imported File In this part, you will image the file you downloaded and saved, in Part I. Finally, in the lab analysis, you will compare the two methods you used (Parts II and III) for imaging and hashing files using the FTK Imager tool. 1. On the virtual desktop, open FTK Imager and go to File > Create Disk Image:

2. Choose Image File and click Next:

3. Browse and locate the “Lab1.exe” you downloaded and click Finish. I had saved the file to Computer > Local Disk (C:) > Users > StudentFirst > Downloads:

Select the file (Lab1.exe) and click Open.

In the Select File box, the Lab1.exe file should populate the Evidence Source Selection. Click Finish.

4. In the Create Image box click on Add…:

5. You will be asked to type in evidence Information and click Next. Put in values, as with example (the Examiner must be you):

Select Next >

6. In the ‘Select Image Destination’ dialogue, use Browse to save the image (I chose StudentFirst > My documents), name the image file, and select Finish:

7. Back in the ‘Create Image’ dialogue, select Start:

Once the imaging is complete, you will see the Drive/Image Verify Results report – make sure and take a screenshot of this information!

Lab Report For this lab, you need to complete a Lab Report, which includes the following requirements:

1. Screen shots of each step in Part II and Part III,

2. The two File Hash Lists from Part II, and

3. Answers the following questions: o How did you alter the original picture in Part II?

o What information can you retrieve from the File Hash List?

o What information can you capture from the FTK Imager tool to identify a file?

o What information can you capture to validate the authenticity of a file/image? The following rubric will be applied for grading this lab:

Homework is Completed By:

Writer Writer Name Amount Client Comments & Rating
Instant Homework Helper

ONLINE

Instant Homework Helper

$36

She helped me in last minute in a very reasonable price. She is a lifesaver, I got A+ grade in my homework, I will surely hire her again for my next assignments, Thumbs Up!

Order & Get This Solution Within 3 Hours in $25/Page

Custom Original Solution And Get A+ Grades

  • 100% Plagiarism Free
  • Proper APA/MLA/Harvard Referencing
  • Delivery in 3 Hours After Placing Order
  • Free Turnitin Report
  • Unlimited Revisions
  • Privacy Guaranteed

Order & Get This Solution Within 6 Hours in $20/Page

Custom Original Solution And Get A+ Grades

  • 100% Plagiarism Free
  • Proper APA/MLA/Harvard Referencing
  • Delivery in 6 Hours After Placing Order
  • Free Turnitin Report
  • Unlimited Revisions
  • Privacy Guaranteed

Order & Get This Solution Within 12 Hours in $15/Page

Custom Original Solution And Get A+ Grades

  • 100% Plagiarism Free
  • Proper APA/MLA/Harvard Referencing
  • Delivery in 12 Hours After Placing Order
  • Free Turnitin Report
  • Unlimited Revisions
  • Privacy Guaranteed

6 writers have sent their proposals to do this homework:

Fatimah Syeda
Ideas & Innovations
Supreme Essay Writer
Innovative Writer
Pro Writer
24/7 Assignment Help
Writer Writer Name Offer Chat
Fatimah Syeda

ONLINE

Fatimah Syeda

I am a professional and experienced writer and I have written research reports, proposals, essays, thesis and dissertations on a variety of topics.

$34 Chat With Writer
Ideas & Innovations

ONLINE

Ideas & Innovations

I am an experienced researcher here with master education. After reading your posting, I feel, you need an expert research writer to complete your project.Thank You

$18 Chat With Writer
Supreme Essay Writer

ONLINE

Supreme Essay Writer

I am a professional and experienced writer and I have written research reports, proposals, essays, thesis and dissertations on a variety of topics.

$49 Chat With Writer
Innovative Writer

ONLINE

Innovative Writer

I find your project quite stimulating and related to my profession. I can surely contribute you with your project.

$21 Chat With Writer
Pro Writer

ONLINE

Pro Writer

I have assisted scholars, business persons, startups, entrepreneurs, marketers, managers etc in their, pitches, presentations, market research, business plans etc.

$17 Chat With Writer
24/7 Assignment Help

ONLINE

24/7 Assignment Help

I reckon that I can perfectly carry this project for you! I am a research writer and have been writing academic papers, business reports, plans, literature review, reports and others for the past 1 decade.

$44 Chat With Writer

Let our expert academic writers to help you in achieving a+ grades in your homework, assignment, quiz or exam.

Similar Homework Questions

Single most characteristic feature of sedimentary rocks - Bsg game final report - Exploring creation with physical science module 3 study guide answers - Mcafee real protect datasheet - Discussion board response - Brian deckert detroit become human - Archangel global security llc washington dc - Certificate ii in automotive vocational preparation - Open and closed form writing - Norton park glen waverley - I need this discussion done for week 2 for my Recruit, Develop, Assess, Reward, Retain class - Domain analysis model example - Earth sun seasons animation - Blades inc case study answers chapter 1 - Key roles for successful analytic project - A specimen of aluminum having a rectangular cross section - Zener diode as voltage regulator lab experiment - Which of the following statements about insulin effects is correct - Elements of film powerpoint - Hotel connected to mandalay bay - The real miss america sniper snopes - Questionnaire on cashless policy - Incident based peer review committee texas bon - Ramsey reset test null hypothesis - Convert nutritional calories to kilojoules - Pureed meals for elderly - Due Tonight Help - Big ideas math red resources by chapter - 7 2 final project submission statistical analysis report - Week 6 Assignment - Reflexology client consultation form - Stream morphology - Commedia dell arte features - The four (4) schools of criminology - Weighted average unit contribution margin formula - Barbano v madison county case brief - Middlesex county college application deadline - Define the term cliché penn foster - Leadership THOUGHT RESPONSES - Poor accuracy good precision - Math 221 statistics for decision making week 6 ilab - Www wda gov rw application - I need help in creating a thorough powerpoint w/ presenter's notes - Red panda food chain - The jewish japanese cookbook and how to raise wolves wiki - Creating a company culture for security design document - Dominant Microprocessor Company - Why gender matters chapter summaries - Continuous variables in a visual display - Assignment 1 - CASE STUDY - PEPSI - POWER POINT PRESENTATION ONLY - Presidential Agenda - How can luminol help solve crimes - How to write assessment report sample - The facebook sonnet sherman alexie analysis - Chemical suicide training for first responders - Blood brothers easy terms - Verapamil 180 mg cd daily - Soundtraxx tsunami steam cv list - Deutsche bank liveability survey - Selby council bin collection - Vehicle suitable for safe use declaration - C coding - Risk and Resilience Value Article - I want a red dress poem - 631.1A - Proportions of the face handout - Iec 60664-1 pollution degree - Carl ferris las vegas - Molson canada social media marketing - Strathclyde mba malaysia fees - Harrisburg furniture company started construction of a combination - Mid-term break by seamus heaney - A project that provides annual cash flows of - Aristotle with a bust of homer analysis - Commonwealth grants rules and guidelines - Single phase controlled rectifier circuit - Abc retailers internal controls - Sexual ethics in judaism - Bell potter private clients - Rewrite the following without an exponent 2 3 - Assignment - 1016 - Moodle vle holly lodge - Computer Hardware - Discussion - Johnny cash music from and inspired by spider man listen - Com510 Week8 - Quizzes - English Artworks Analysis Paper - Pos 2041 midterm study guide - Wikisummary - What does the name echinoderm mean - Lmx questionnaire example - Stand by me gordie - Journal of juvenile law - Freedom writers journal prompts - Lottery & Lucky Number Specialist 91 9799046502 Molvi Ji - Ecosmart water heater problems - SQL DATABASE