Loading...

Messages

Proposals

Stuck in your homework and missing deadline? Get urgent help in $10/Page with 24 hours deadline

Get Urgent Writing Help In Your Essays, Assignments, Homeworks, Dissertation, Thesis Or Coursework & Achieve A+ Grades.

Privacy Guaranteed - 100% Plagiarism Free Writing - Free Turnitin Report - Professional And Experienced Writers - 24/7 Online Support

Registry analysis in digital forensics

25/11/2021 Client: muhammad11 Deadline: 2 Day

CMIT 424: Digital Forensics Analysis and Application

Lab 5: Reconstruct System Usage Using Registry and Other System Files
Introduction
This lab builds upon the acquisition, processing, and analysis techniques that you learned and practiced in earlier labs in this course.

In this lab, you will practice finding, recovering, and analyzing system usage information for a Windows 7 computer system. Before you begin, you should review the following readings, which address analytical processes and techniques used to recover and evaluate information about system usage.

1. FTK Registry Viewer User Guide (access the PDF file from the Registry Viewer help menu)

2. FTK User Guide (access the PDF file from the FTK help menu)

a. Chapter 16, "Using the Examiner Interface"

b. Chapter 17, "Exploring Evidence"

c. Chapter 18, "Examining Evidence in the Overview Tab"

d. Chapter 22, "Examining Miscellaneous Evidence"

e. Chapter 23, "Bookmarking Evidence"

f. Chapter 32, "Working with Evidence Reports"

g. Chapter 35, "Working with Windows Registry Evidence"

Lab 5 Scenario and Case Questions
A laptop from the offices of Practical Applied Gaming Solutions, Inc., has been sent to your lab for analysis. This laptop was returned to the company by a former employee several weeks after the employee's unexpected resignation.

During case triage, it was determined that VMWare was installed on the laptop. Several folders containing virtual machines were also found. A forensic image (E01 format) was created from each of the virtual disks (VMDK files) by a forensic technician using FTK Imager.

You have been asked to contribute to the investigation by reconstructing the usage of one of the virtual machines from the contents of the associated VMDK file. The chain-of-custody log states that this file contains a Windows 7 system disk.

The lead investigator has asked you to address the following case questions during your examination of the evidence. (Ignore the Internet cache and index files for this lab; you will analyze and report on them in Lab 6.)

1. When was the Windows 7 image created (installed in the VM), and during what time period was it in use?

2. What software applications were loaded and available for use in the VM?

3. Who used the Windows 7 VM? (More than one user?)

4. What was the Windows 7 VM used for?

5. Was the VM used regularly or repeatedly?

6. Are there indications of an intent to hide or obscure how the VM was used?

7. Are there indications of an intent to use the VM to facilitate illegal or unethical behavior? (Unethical includes actions that are contrary to the employer's best interests or that violate the company's Acceptable Use Policy governing use of company resources—i.e., the laptop on which the VM was found.)

Lab 5 Overview
In this lab you will search for, recover, and analyze system usage information from a forensic image provided by your instructor. At a minimum, you should perform the following tasks:

· Analyze the Windows Registry to recover information about the Windows 7 operating system and how it was used.

· Analyze the contents of system log files, link files (shortcuts), and prefetch files.

· Reconstruct user-level system usage using information recovered from folders and files stored in user profiles.

· Analyze the contents of the recycle bin.

· Reconstruct system-level usage information found in the file system metadata (use the information shown in the file list pane).

· Construct a timeline showing significant system usage events, such as boot, shutdown, installation of software, installation of patches or updates, user logins, etc.

· Note: The provided forensic image has been modified for training purposes.

· The virtual disk is no longer bootable.

· Files whose contents are not required for this examination have been overwritten with 0x00 (securely wiped).

· The file system data structures have not been modified; the original directory entries remain intact.

As you complete your analysis for this lab, you will need to keep track of specific files that provide forensically important information for your analysis and reporting. In previous labs, you used an annotated file inventory for this purpose. In this lab, you will learn two more methods:

· checked files (see Chapter 17, FTK User Guide) and

· bookmarks (see Chapter 23, FTK User Guide)

Both of these tracking features are accessed in the file list pane by right-clicking on the filename and then selecting the feature from the pop-up menu. You can also access the case Bookmarks using the Bookmarks tab at the top of the Examiner Window.

In Guided Practice #1, you will examine the contents of the Windows 7 registry. Your examination of the individual Windows 7 registry hives should provide you with the following information and/or answers to questions listed below. You will need this information to answer the case questions. In this part of the lab, you will also generate a registry report that documents the associated keys and key values.

· Operating system version.

· Installation date.

· Registered owner. (Is there something odd about this?)

· Computer name.

· Current time zone.

· Fixed hard drives (virtual drives) used in the VM (mounted devices).

· Removable USB media used in the VM. What are the manufacturer and serial numbers of the USBs?

· Installed software (provide a list of all sub keys showing user-installed software packages; add rows as necessary). Pay attention to the last written dates for keys. Keys prior to the installation date represent software that is part of the Windows 7 package and, for this lab, should not be included in your list of installed software.

· Installed software for individual users (find and process the NTUSER.DAT file for each user on the system; this file contains the HKCU hive).

· Recent files accessed by individual users (find and process the NTUSER.DAT file for each user on the system; this file contains the HKCU hive).

· Most recently used (MRU) items including software applications and files.

· Any additional keys you found to be helpful in determining how this VM was used, when it was used, and who used it.

In Guided Practice #2, you will examine the contents of link files (shortcut files), log files, and prefetch files recovered from the virtual disk. (You may need to research the format and usage for specific file types to learn more about what they can tell you regarding system usage.) The file contents provide information about events that occurred or actions that were performed, and possibly also when those events occurred. The locations of these files will provide information as to who (system or a specific user account) performed the actions captured in the contents and metadata. When reviewing these files, be sure to examine both the contents and the file properties using the file contents pane. In this part of the lab, you will mark files of forensic interest (ones that you will use to answer the case questions) using checked files and Bookmark categories. You will then generate an FTK report that lists the files (by file path), the Bookmark categories, and the files included under each bookmark.

Before you begin this part of the lab, you should decide upon the format that you will use to create your system usage timeline. Your timeline could be presented in a table in a Microsoft Word document or as an Excel spreadsheet. The important thing to remember is that your timeline should clearly show the events that are of forensic interest and the date/time of occurrence for each event. You should also list the files that provided the information about each event. Below is a suggested table format for a system usage timeline. This format can be used in either Microsoft Word or Microsoft Excel.

Date/Time

Event

Description

Files or Artifacts created or modified

In Guided Practice #3, you will generate an inventory of selected folders and files from the forensic image of the virtual disk. You will use this inventory to construct a tentative timeline of events and identify file/folder entries that can provide answers to the case questions. For this part of the lab, your analysis is restricted to file properties and directory-level information—file paths, creation dates, last access dates, last modified dates, etc.

In Guided Practice #4, you will write a lab report memo (three to five pages maximum) in which you document your answers to the case questions. Each answer must be supported by information contained in the forensic image and you must identify which artifacts (files or folders) support your answers. Provide your supporting documentation, i.e., registry reports, file inventory, and timeline of system usage, as a single zip archive. The registry reports, file inventory and timeline files should be submitted in a single zip file archive; this documentation is not counted in the lab memo page count.

Required Software
· Forensic Toolkit

· FTK Registry Viewer

· WinHex

· MS Office (Word, Excel, PowerPoint)

· Adobe Reader (or another PDF file viewer)

· Web browser

Required Software
· Forensic Toolkit

· FTK Registry Viewer

· MS Excel (or equivalent spreadsheet application)

Deliverables
1. Incident Investigation Summary Report (5-8 pages with tables / screen shots)

Prepare a memo-format report summarizing answers to the case questions and providing documentation as to the tools, techniques, and procedures used in this lab. Your report should include high-level analysis summaries in table format for:

a. Registry Analysis & Values of Important Keys (GP#1)

b. System Usage Data (GP#2)

c. Meta Data Analysis of Important Files (GP#3)

Note: Your “high level summaries” of your analysis results should be *summaries* not a compendium of every piece of information found in the image. Focus on providing data which provides support to your answers to the case questions. Irrelevant information should not be included.

2. System Usage Timeline

This table will be created in Guided Practice #3.

Grading for Lab Deliverables
1. Incident Investigation Summary Report 60%

a. Overview 15%

b. Findings & Answers to Case Questions 15%

c. Summary Tables 15%

d. Description of Analysis & Processing 15%

2. System Usage Timeline 25%

3. Professionalism 15% (formatting, grammar, spelling, punctuation, etc.)

Lab 5 Outcomes
Lab 5 Outcomes

Course Outcomes for Lab 5

· reconstruct system usage using Windows Registry and other system files

· perform and document timeline analysis

· prepare brief report summarizing findings and answering case questions

· apply rules and guidelines as they pertain to the acquisition, handling, and storage of digital artifacts

· select and apply the most appropriate methodology to extract data based on circumstances and reassemble artifacts from data fragments

· analyze and interpret data collected and report outcomes in accordance with incident response handling guidelines

Homework is Completed By:

Writer Writer Name Amount Client Comments & Rating
Instant Homework Helper

ONLINE

Instant Homework Helper

$36

She helped me in last minute in a very reasonable price. She is a lifesaver, I got A+ grade in my homework, I will surely hire her again for my next assignments, Thumbs Up!

Order & Get This Solution Within 3 Hours in $25/Page

Custom Original Solution And Get A+ Grades

  • 100% Plagiarism Free
  • Proper APA/MLA/Harvard Referencing
  • Delivery in 3 Hours After Placing Order
  • Free Turnitin Report
  • Unlimited Revisions
  • Privacy Guaranteed

Order & Get This Solution Within 6 Hours in $20/Page

Custom Original Solution And Get A+ Grades

  • 100% Plagiarism Free
  • Proper APA/MLA/Harvard Referencing
  • Delivery in 6 Hours After Placing Order
  • Free Turnitin Report
  • Unlimited Revisions
  • Privacy Guaranteed

Order & Get This Solution Within 12 Hours in $15/Page

Custom Original Solution And Get A+ Grades

  • 100% Plagiarism Free
  • Proper APA/MLA/Harvard Referencing
  • Delivery in 12 Hours After Placing Order
  • Free Turnitin Report
  • Unlimited Revisions
  • Privacy Guaranteed

6 writers have sent their proposals to do this homework:

Essay Writing Help
Accounting & Finance Master
Online Assignment Help
Accounting & Finance Specialist
Professional Coursework Help
Quick Mentor
Writer Writer Name Offer Chat
Essay Writing Help

ONLINE

Essay Writing Help

I will be delighted to work on your project. As an experienced writer, I can provide you top quality, well researched, concise and error-free work within your provided deadline at very reasonable prices.

$47 Chat With Writer
Accounting & Finance Master

ONLINE

Accounting & Finance Master

I am a PhD writer with 10 years of experience. I will be delivering high-quality, plagiarism-free work to you in the minimum amount of time. Waiting for your message.

$34 Chat With Writer
Online Assignment Help

ONLINE

Online Assignment Help

This project is my strength and I can fulfill your requirements properly within your given deadline. I always give plagiarism-free work to my clients at very competitive prices.

$27 Chat With Writer
Accounting & Finance Specialist

ONLINE

Accounting & Finance Specialist

After reading your project details, I feel myself as the best option for you to fulfill this project with 100 percent perfection.

$50 Chat With Writer
Professional Coursework Help

ONLINE

Professional Coursework Help

As per my knowledge I can assist you in writing a perfect Planning, Marketing Research, Business Pitches, Business Proposals, Business Feasibility Reports and Content within your given deadline and budget.

$45 Chat With Writer
Quick Mentor

ONLINE

Quick Mentor

I can assist you in plagiarism free writing as I have already done several related projects of writing. I have a master qualification with 5 years’ experience in; Essay Writing, Case Study Writing, Report Writing.

$38 Chat With Writer

Let our expert academic writers to help you in achieving a+ grades in your homework, assignment, quiz or exam.

Similar Homework Questions

Argumentative essay about How is biodiversity important to a thriving planet? What are the dangers of the high rate of species extinction that the planet is facing? What are the proposed solutions to this problem and how effective will they be? - Multilayered process of family therapy - Comprehensive problem 3 kornett company balance sheet - The length of the string "hello there. " is ____. - Ice cream distribution model - Other words for addition - Plastic Seed Trays - Nursing - Water rocket launcher designs - Calgary cambridge consultation model - One of hipaa's five overall objectives is - Week 3 Topics Essay - Gcu learning resources - Project management - The art of delegation ppt - Black in latin america mexico and peru worksheet answers - List three broad classifications of external or peripheral devices - Business ethics concepts and cases by manuel velasquez pdf - Shadow health neurological assessment - Find a friend lyrics elizabeth bedford - Maiden lane community centre - Need today - Introduction to assembly language ppt - West african baboon crossword clue - Using the following information prepare a bank reconciliation - Marketing myopia examples in sports - 10 36 police code - You are using an exponential smoothing model for forecasting - The Prompt - Literary techniques in pride and prejudice - A1 a2 a3 a4 - Lewis electron dot structure for h2o - Legal Brief Writing Assignment - Urgent. A+ Work Required. 12-14 Hours - Https www youtube com watch v ebgb40yh4sy - Ob gyn soap note template - Essex adult safeguarding board - Monster high 13 wishes - Cold pack endothermic - Human factors in civil and transport engineering - 10 wren court mount barker - City in utah that is home to brigham university - Hp z230 sff workstation specs - Activity 13.4 glacier national park investigation answers - Char cannot be converted to charsequence - Nfpa 70e training powerpoint - Reflection - Asthma soap - Human resources - How do technologies related to microorganisms suggest ethical conflicts - Systematized nomenclature of medicine clinical terms snomed ct - Advantages and disadvantages of participative management - Excuse my french rose dan murphy - Https://www.thephysicsaviary.com/Physics/Programs/Labs/MillikanOilDropLab/index.html - Gentex commander 3 fire alarm - Devil in the white city literary devices - How difficult can this be dvd - Clone phone fully loaded - Manningham council aged care services - Cage analysis brazil - How to prepare a final account in construction - What are the characteristics of money market instruments - Ethics titles - What does the triangle mean in naplan - Conformity and conflict 13th edition chapter summaries - California tale mark twain - Urgent 2- 7 hours - Reflections - Webcast bkwsu eu uk - Astc rule in trigonometry - Amazon fire phone target market - Extreme ownership pdf download free - Shark tank business plan template - Tweak growing up on summary - Fill in the blanks of the primate tree - Conflict theory of aging - English Composition II - Essay 3 - John smith has developed the following forecasting model - How has globalization impacted the world’s political realm? - Autocad map import shapefile - Emulsification of fats in the duodenum is assisted by: - Lobe of the cerebrum controls motor functions - Circular bodied guitar crossword clue - Citationmachine net apa cite a book - 150 words - How did the poem invictus inspire nelson mandela - Oldfield park infant school - Social learning theory bowlby ainsworth piaget vygotsky - He ne laser diagram - Ms project cash flow report - The cat sat on the mat sentence - Just a spoonful of love part two - Three questions - Words with 3 consecutive letters of the alphabet - Apollo xp95 sounder base wiring diagram - Issa 12 week periodized training program - Exam - Informatics and nursing opportunities and challenges 4th edition pdf - Which type of exocrine gland is a simple coiled tubular - Common motifs in literature