Loading...

Messages

Proposals

Stuck in your homework and missing deadline? Get urgent help in $10/Page with 24 hours deadline

Get Urgent Writing Help In Your Essays, Assignments, Homeworks, Dissertation, Thesis Or Coursework & Achieve A+ Grades.

Privacy Guaranteed - 100% Plagiarism Free Writing - Free Turnitin Report - Professional And Experienced Writers - 24/7 Online Support

What is ftk imager used for

28/10/2021 Client: muhammad11 Deadline: 2 Day

Project 4 Start Here
Watch Video https://youtu.be/i2szxZ3OfDI

One of the most commonly used commercial digital forensic tools is Forensic Toolkit from Access Data, more commonly known as FTK. FTK is an integrated tool used in many types of digital forensic investigations, with a particular focus on computers and servers. Additional Access Data tools that are commonly used with FTK include Password Recovery Toolkit (PRTK) and Registry Viewer. FTK Imager, which is license free, is used to create forensic images of various types of media in a variety of formats. that can be utilized by a wide variety of digital forensic tools. In this project you will use all four of these Access Data tools in a typical law enforcement scenario.

There are three steps in this project. In those steps you use FTK and other Access Data tools to image two computers and a thumb drive or USB stick. Each step in the project requires you to respond to detectives' questions based on computer images.

The final assignment is a paper that helps detectives better understand the use of FTK Imager and other Access Data tools to access and image computers and thumb drives. In Step 1, you introduce detectives to the basics of forensic digital investigation by creating an image using FTK Imager. Let’s begin!

Step 1: FTK Imaging Lab Report
One of the first steps in conducting forensic investigations often involves creating an image of the forensic evidence. Forensic evidence can be found in operating systems, network traffic (including e-mails), and software applications. To help the detectives in your department understand the digital forensics investigation process better, you have offered to show them how you create an image using FTK Imager. FTK Imager can be used to analyze many types of media including audio, pictures, and videos. Graphics files can be a rich source of forensic evidence.

Because you are pressed for time, you go to the virtual lab and decide to create an image of the “My Pictures” directory on your computer. This process is very similar to making a full computer image, but it takes only a few minutes rather than several hours. You are preparing a report describing the steps that you follow so the detectives can refer to it later. You will include a screenshot and text file (CSEC662_Lab1_Name.ad1) that documents your imaging process with information such as hash values.

Complete This Lab
User Name and password for the Labs

User Name: VKING15

PWD: 1Heart=1Love!

Here are some resources that will help you complete the lab:

Accessing the Virtual Lab Environment: Navigating the Workspace and the Lab Setup.
Review the Workspace and Lab Machine Environment Tutorial
Lab Instructions: Imaging Using FTK Imager
Self-Help Guide: Workspace: Getting Started and Troubleshooting
Getting Help: To obtain lab assistance, email GraduateCyber@umuc.edu using the following template in the body of your email.
Your full name:
Your user ID:
Preferred email:
Your course and section number:
Detailed description of the issue that you are experiencing:
Machine type (PC, tablet, mobile device):
OS type and version:
Browser type and version:
Provide any information related to the issue that you are experiencing and attach any screenshot that you may be able to produce related to the issue.

Additional Lab Support Information:
More lab-related self-help information is available if you register for CLAB 699, our free online graduate Cyber Computing Lab Assistance hub.

Registering for Cyber Computing Lab Assistance

Submit your report for review and ungraded feedback from the detectives (your instructor). Incorporate any suggested changes; you will include your report in the Use of Access Data Tools paper that you submit in Step 4.

Now that you have demonstrated the imaging process and investigative techniques to detectives, you are ready to proceed to the next step in which you demonstrate the use of Registry Viewer.

Step 2: Process an Image from the suspect Mantooth’s computer
Keywords: Examining meta data, File systems, Hexadecimal and ASCII,Operating Systems, Report writing, File system information gathering

In the previous step you imaged a directory for a forensic report using FTK Imager. Now the detectives have requested additional analysis so you decide to go to the virtual lab and use Registry Viewer to access user account information for the image from the Mantooth computer.

Complete This Lab
Here are some resources that will help you complete the lab:

Accessing the Virtual Lab Environment: Navigating the Workspace and the Lab Setup.
Review the Workspace and Lab Machine Environment Tutorial
Lab Instructions: Imaging Processing and Analysis Using FTK (Part 1)
Self-Help Guide: Workspace: Getting Started and Troubleshooting
Getting Help: To obtain lab assistance, email GraduateCyber@umuc.edu using the following template in the body of your email.
Your full name:
Your user ID:
Preferred email:
Your course and section number:
Detailed description of the issue that you are experiencing:
Machine type (PC, tablet, mobile device):
OS type and version:
Browser type and version:
Provide any information related to the issue that you are experiencing and attach any screenshot that you may be able to produce related to the issue.

Additional Lab Support Information:
More lab-related self-help information is available if you register for CLAB 699, our free online graduate Cyber Computing Lab Assistance hub.

Registering for Cyber Computing Lab Assistance

The Mantooth image is a subset of a full computer image. While it is rich in artifacts, it is small enough to process in minutes rather than hours. Registry Viewer provides the ability to view the contents of various types of registry files so it will help to answer some of the questions posed by detectives. You can also investigate the suspect Mantooth's e-mail activity and picture files.

The detectives have requested the following information:

Mantooth's first name and a screenshot of a picture
Number of jpg files in the Mantooth evidence file
Names of the e-mail domains from the e-mail in this image, plus the number of sent and received messages and the dates of the oldest and newest sent and received e-mail message for each domain
Names of people who have sent e-mail to or received e-mail from Mantooth, and the number of e-mails sent or received to and from each person
Information on encryption—whether it was used for any of the e-mail, and if so, what type
Evidence of potential criminal activity within this image
Information on how PINs were captured
Vehicle Identification Number of the '92 Dodge
Identity of Sean and his role in this case
Malware that initiates on startup
Information on password(s)—where you found it/them, whether it/they are usable, what it/they are used for
The detectives are also asking for:

Summary of findings
Case documentation, such as tools used, version, and image hashes
Screenshots or other forensic artifacts supporting your responses to the questions
You review your responses and summary information carefully for accuracy and completeness, and save them in a single file to be included in your final paper on Using Access Data tools (Step 4).

Just when you think that the detectives are satisfied with the information that you’ve provided, they request even more information on the suspects and the crime. You can’t say no, so you turn to PRTK to help you access that data...

Step 3: Process an Image from the suspect Washer’s computer
Keywords: Examining metadata, File systems, Hexadecimal and ASCII, Operating Systems, File system information gathering

The Mantooth image has provided a lot of new information, but the detectives want more. PRTK is the tool that can uncover it. An image has been taken of the hard drive in a computer belonging to a suspect named Washer.

Complete This Lab
Here are some resources that will help you complete the lab:

Accessing the Virtual Lab Environment: Navigating the Workspace and the Lab Setup.
Review the Workspace and Lab Machine Environment Tutorial
Lab Instructions: Imaging Processing and Analysis Using FTK (Part 2)
Self-Help Guide: Workspace: Getting Started and Troubleshooting
Getting Help: To obtain lab assistance, email GraduateCyber@umuc.edu using the following template in the body of your email.
Your full name:
Your user ID:
Preferred email:
Your course and section number:
Detailed description of the issue that you are experiencing:
Machine type (PC, tablet, mobile device):
OS type and version:
Browser type and version:
Provide any information related to the issue that you are experiencing and attach any screenshot that you may be able to produce related to the issue.

Additional Lab Support Information:
More lab-related self-help information is available if you register for CLAB 699, our free online graduate Cyber Computing Lab Assistance hub.

Registering for Cyber Computing Lab Assistance

The Washer image is a subset of a full computer image (similar to the Mantooth image) so processing time is reduced. While it is rich in artifacts, it is small enough to process in minutes rather than hours. You have full confidence that an investigation of the Washer image will approximate the investigation of a full computer image. Registry Viewer allows you to view the contents of various types of registry files, but PRTK can decrypt files as well. Passwords for certain files may be recoverable from other artifacts on the image as well.

The detectives have asked you to analyze the Washer and thumb drive processed images within FTK to ferret out the following facts. You will include your answers to these questions in your final paper on the Use of Access Data tools.

What are the AIM usernames for Rasco Badguy and John Washer?
What is the current zip code for the AOL IM account registered to Washer?
When was AOL IM installed?
Rasco Badguy and John Washer plan to camp.

What does Rasco's vehicle look like? Please provide a description. Who might Rasco bring with him?
Provide the starting and ending points for their camping trip, as well as the name of body of water nearby (same as road running along shore). Find a map and directions to the spot where they will camp.
Please provide this additional information:

Document three distinct types of criminal activity that are under consideration and discussion by these individuals.
There is a particular piece of software that will support one of the types of criminal activity under consideration. It is being obscured by file manipulation or encryption. Document the name of the file, its function, and what needs to be installed for it to operate properly.
Document two names, addresses, and credit card or account numbers of potential victims.
Prove that the file “How To Steal Credit Card Numbers.doc” was opened on the computer.
The word “oops” has come up in intercepted traffic. Document what it refers to.
Document three ways this case has familiarity or linkages to any other case you are familiar with.
A number of people in this case owe money. Document who they are and how much they owe.
Is there anything that links the thumb drive to the Washer image?
Document how many times the administrator account was used and the date of the last login (hint: during 2008).
Once again the detectives are asking for a summary of your investigative procedures and findings so you document the following:

Summary of findings
Case documentation such as tools used, version, and image hashes
Screenshots or other forensic artifacts that support your responses to all questions
You review your responses and summary documentation carefully for accuracy and completeness for you will be including them in your final paper.

Step 4: Submit Final Paper: Use of Access Data Tools
The time has come to combine work products from Steps 1, 2, and 3 into a final paper summarizing the Use of Access Data Tools. You submit it to the detectives (your instructor) and cross your fingers that it contains everything they need to know about the most widely-used tools available for accessing and imaging forensic data.

Homework is Completed By:

Writer Writer Name Amount Client Comments & Rating
Instant Homework Helper

ONLINE

Instant Homework Helper

$36

She helped me in last minute in a very reasonable price. She is a lifesaver, I got A+ grade in my homework, I will surely hire her again for my next assignments, Thumbs Up!

Order & Get This Solution Within 3 Hours in $25/Page

Custom Original Solution And Get A+ Grades

  • 100% Plagiarism Free
  • Proper APA/MLA/Harvard Referencing
  • Delivery in 3 Hours After Placing Order
  • Free Turnitin Report
  • Unlimited Revisions
  • Privacy Guaranteed

Order & Get This Solution Within 6 Hours in $20/Page

Custom Original Solution And Get A+ Grades

  • 100% Plagiarism Free
  • Proper APA/MLA/Harvard Referencing
  • Delivery in 6 Hours After Placing Order
  • Free Turnitin Report
  • Unlimited Revisions
  • Privacy Guaranteed

Order & Get This Solution Within 12 Hours in $15/Page

Custom Original Solution And Get A+ Grades

  • 100% Plagiarism Free
  • Proper APA/MLA/Harvard Referencing
  • Delivery in 12 Hours After Placing Order
  • Free Turnitin Report
  • Unlimited Revisions
  • Privacy Guaranteed

6 writers have sent their proposals to do this homework:

Professor Smith
Ideas & Innovations
Financial Hub
Smart Tutor
Buy Coursework Help
Financial Assignments
Writer Writer Name Offer Chat
Professor Smith

ONLINE

Professor Smith

As per my knowledge I can assist you in writing a perfect Planning, Marketing Research, Business Pitches, Business Proposals, Business Feasibility Reports and Content within your given deadline and budget.

$34 Chat With Writer
Ideas & Innovations

ONLINE

Ideas & Innovations

I reckon that I can perfectly carry this project for you! I am a research writer and have been writing academic papers, business reports, plans, literature review, reports and others for the past 1 decade.

$38 Chat With Writer
Financial Hub

ONLINE

Financial Hub

I have assisted scholars, business persons, startups, entrepreneurs, marketers, managers etc in their, pitches, presentations, market research, business plans etc.

$48 Chat With Writer
Smart Tutor

ONLINE

Smart Tutor

I have read your project details and I can provide you QUALITY WORK within your given timeline and budget.

$42 Chat With Writer
Buy Coursework Help

ONLINE

Buy Coursework Help

I will be delighted to work on your project. As an experienced writer, I can provide you top quality, well researched, concise and error-free work within your provided deadline at very reasonable prices.

$29 Chat With Writer
Financial Assignments

ONLINE

Financial Assignments

I have read your project details and I can provide you QUALITY WORK within your given timeline and budget.

$32 Chat With Writer

Let our expert academic writers to help you in achieving a+ grades in your homework, assignment, quiz or exam.

Similar Homework Questions

Cat's paw crossword clue - Mmu counselling drop in - Blades inc case - Cibc smart plus account redflagdeals - Gui application development using vb net - D7 - 15th century painting of a market in the netherlands - Writing help with solving a problem - Wigton wind farm prospectus - Sustainable growth rate calculator - Friend or foe book - Helmholtz coil magnetic field derivation - The leap by louise erdrich questions - Pharmacy revenue cycle internal audit - NEED CHEMISTRY II EXPERT PLEASE READ - Why is the reflective-practice phase of metacognition also referred to as “double-looped learning”? - Coalmining history resource centre - Thin lens equation problems - Aquinas university of legazpi tuition fee - Fritz redl classroom management - Uts student centre appointment - Unit in place method - Argument - Surface area to volume ratio formula - Aided self help housing trinidad - The outsiders chapter 6 audiobook - Acts 25 bible study questions - Psychology theology and spirituality in christian counseling summary - Bishops stortford registry office - Summarize god's statements in genesis 2 16 18 - Why scandinavian prisons are superior thesis statement - Way cool produces two different models of air conditioners - Financial analysis - The ballad of gilligan's island lyrics - Discussion Board - Harmonie water case study - Excel Financial Ratios - Gmdss radio log book pdf - Prithee what wouldst thou - Anderson's business law 23rd edition pdf free download - Buck-boost dc-to-dc converters - David darst net worth - Direct material price variance - Roman counterpart of ares - Ip sla timeout vs threshold - A consonant e words - Research - Programming language design principles - NEED 3+ PAGES WITH 4 Peer Reviewed REFERENCES CITED IN APA FORMAT - What is a pragmatic research study - Device tree for dummies - Brivis remote flue terminal - Find the estimates of beta 0β0 and beta 1β1. - Duolingo korean basics 1 - Determination of water hardness by edta titration calculations - Wk 1, IOP 470: DR, 1 - Dawn dupree textile artist - Climate change - Facial treatment consultation form - Which of the following is a nonvascular plant - Bolton v stone 1951 ac 850 - WALMART MARKING PLAN - Analysis of copper in a brass sample - Georgia tech buzz funds - Lies my teacher told me chapter 11 - Maltese road primary school - Nursing interventions for kussmaul respirations - What is metadata which component of a dbms maintains metadata - Culpam poena premit comes pronunciation - What is bavarian sausage inc s operating cash flow - Ccou 301 research paper - Symbolism in the three little pigs - Wyndham nashville 3 bedroom lockoff floor plan - Scope of cyber security in nepal - Common grade scale for preliminary courses - How to cite aacn in apa - 194r hm4e n2 l - An item found in an old man's wallet family feud - Chapter 3 jekyll and hyde - Project Network - Oci document checklist minor - Convert mga94 to amg84 - Shell tellus s2 vx 46 msds - Team Management Activity and Reflection - Jim jefferies amsterdam egg - Alphabet foxtrot romeo alpha - 263 blackpepper loop little river sc - Rio salado chm 130 midterm answers - Buffet service advantages and disadvantages - Soap Note - Public health nurse assessment - Journal entry 32 on course - Blood test hervey bay - Blue spruce corp balance sheet - Gpo box 4176 sydney - DURBAN Gynecological FEMALE +27835179056 SAFE ABORTION PILLS IN Bergville Elandslaagte Estcourt Ladysmith Winterton Dundee - Bhagavad gita shri purohit swami pdf - I need 1000 words - 5-3-1 activity: historical context chart - Theatre experience wilson 13th edition