LAB5_Digital Forensics Technology and Practices_Kwadwo Antwi
docx
keyboard_arrow_up
School
University of Maryland, University College *
*We aren’t endorsed by this school
Course
640
Subject
Information Systems
Date
Dec 6, 2023
Type
docx
Pages
17
Uploaded by joespady4u25
Name:
XXXXX
Semester: Summer
Year: 2023
Section Number: 7621
Lab 5 Worksheet Digital Forensics
Technology and Practices
Table of Contents
Introduction
...............................................................................................................................................................
2
Screenshot 1 – Yourname-OS as the Volume Label for the C: Drive
...........................................................................
3
Screenshot 2 – Volume Label of Yourfirstname-NTFS for the H: Drive
.......................................................................
4
Screenshot 3 – Volume Label of Yourfirstname-FAT32 for the I: Drive
.......................................................................
5
Screenshot 4 – Evidence Item Information for the NTFS Drive
..................................................................................
6
Screenshot 5 – MD5 and SHA1 hashes of your NTFS Image
.......................................................................................
7
Screenshot 6 – Evidence Item Information for the FAT32 Drive
.................................................................................
8
Screenshot 7 – MD5 and SHA1 hashes of your FAT32 Image
.....................................................................................
9
Screenshot 8 – Evidence Item Information for Autospy
...........................................................................................
10
Screenshot 9– Master File Table, or $MFT within the NTFS Image in Autopsy
.........................................................
11
Screenshot 10– Yourname Volume Label within the FAT32 Image in Autopsy
.........................................................
12
Conclusion
...............................................................................................................................................................
13
APA References
........................................................................................................................................................
14
1
Introduction
Students:
In the box below, please explain the purpose of Imaging and explain how it is
relevant to Digital Forensics Technology and Practices.
Introduction
An exact replica of a physical storage device is a forensic image copy. All folders, files, unallocated space,
free space, and slack space are included in this. All deleted files and fragments of deleted files that are still in
slack or free space are also included in forensic photographs. Images of files that the operating system can
see are not the only ones that fall under this. One aspect of computer forensic imaging is using methods in
computer crime investigations and evaluating obtained evidence for legal court processes. Backup and
imaging applications don't always provide forensic pictures. Windows backup can produce images, which are
incomplete copies of the real device. Other than what is found in an operating system, other evidence might
be found in the cybercrime investigation. Usually, this is evidence that has been removed to prevent
detection. The creation and backup of a forensic image can stop data loss brought on by original disk
failures. If the original drive is lost, or a drive fails, this will guarantee that forensic investigators may still
present their arguments in court. Because having a lot of data or evidence might scuttle legal proceedings,
critical fires watched for evidence should be photographed for security ("Forensic image," 2017).
The first and most important guideline for managing digital evidence is to keep it safe. A technique used to
record all a digital storage device’s content is called "forensic imaging." The logical structure as well as the
metadata of its contents are recorded. The forensic image includes the file slack space as well as the
unallocated space. DD and e01 (Encase) formats are the most widely used software applications for forensic
photos (Berryhill, 2019).
2
3
Your preview ends here
Eager to read complete document? Join bartleby learn and gain access to the full version
- Access to all documents
- Unlimited textbook solutions
- 24/7 expert homework help
Screenshot 1 – Yourname-OS as the Volume Label for the C: Drive
1.
Take a screenshot of yourname-OS as the DRIVE LABEL for C:. The use of anyone else’s name may
result in an academic integrity review by your professor. Please label your screenshot to receive full
credit.
Take a screenshot of the Your Name-OS as the Drive Label for the C: Drive.
Image 1: My name - OS as the Volume Label for the C: Drive
4
Screenshot 2 – Volume Label of Yourfirstname-NTFS for the H: Drive
2.
Take a screenshot of yourname-NTFS as the DRIVE LABEL for H:. The use of anyone else’s name may
result in an academic integrity review by your professor. Please label your screenshot to receive full
credit.
Take a screenshot of the Your Name-NTFS as the Drive Label for the H: Drive.
Image 2: My name - -NTFS as the Drive Label for the H: Drive.
5
Screenshot 3 – Volume Label of Yourfirstname-FAT32 for the I: Drive
3.
Take a screenshot of yourname-FAT32 as the DRIVE LABEL for I:. The use of anyone else’s name may
result in an academic integrity review by your professor. Please label your screenshot to receive full
credit.
Take a screenshot of the Your Name-FAT32 as the Drive Label for the H: Drive.
Image 3: My name - -FAT32 as the Drive Label for the H: Drive
6
Your preview ends here
Eager to read complete document? Join bartleby learn and gain access to the full version
- Access to all documents
- Unlimited textbook solutions
- 24/7 expert homework help
Screenshot 4 – Evidence Item Information for the NTFS Drive.
4.
Take a screenshot of Your First Name and Your Last Name as the Examiner along with the other
items you are required to fill out for the Evidence Items. The use of anyone else’s name may result in
an academic integrity review by your professor. Please label your screenshot to receive full credit.
Take a screenshot of Your First Name and Your Last Name as the Examiner
Image 4: My name as the Examiner
7
Screenshot 5 – MD5 and SHA1 hashes of your NTFS Image
5.
Provide the MD5 and SHA1 hashes of your NTFS file. Paste two screenshots, side by side.
•
The MD5 and SHA1 hash of your Image file from the FTK Drive/Image Verify Results Screen
•
The MD5 and SHA1 hash of your Image file from hashtab
Label your screenshot. It is mathematically possible that you and another student could have the
same MD5 hash for your Disk. But the chance of that is 1 in
340,282,366,920,938,463,463,374,607,431,768,211,456. For that reason, the hash should be
unique or there may be an academic integrity review by your professor.
Image 5:
MD5 and SHA1 hashes of your NTFS Image
8
Screenshot 6 – Evidence Item Information for the FAT32 Drive.
6.
Take a screenshot of Your First Name and Your Last Name as the Examiner along with the other
items you are required to fill out for the Evidence Items. The use of anyone else’s name may result in
an academic integrity review by your professor. Please label your screenshot to receive full credit.
Take a screenshot of Your First Name and Your Last Name as the Examiner
Image 6
9
Your preview ends here
Eager to read complete document? Join bartleby learn and gain access to the full version
- Access to all documents
- Unlimited textbook solutions
- 24/7 expert homework help
Screenshot 7 – MD5 and SHA1 hashes of your FAT32 Image
7.
Provide the MD5 and SHA1 hashes of your NFAT32 image file. Paste two screenshots, side by side.
•
The MD5 and SHA1 hash of your Image file from the FTK Drive/Image Verify Results Screen
•
The MD5 and SHA1 hash of your Image file from hashtab
Label your screenshot. It is mathematically possible that you and another student could have the
same MD5 hash for your Disk. But the chance of that is 1 in
340,282,366,920,938,463,463,374,607,431,768,211,456. For that reason, the hash should be
unique or there may be an academic integrity review by your professor.
Image 7
10
Screenshot 8 – Evidence Item Information for Autopsy
8.
Take a screenshot of Your First Name and Your Last Name as the Examiner along with the other
items you are required to fill out for the New Case Information for Autopsy. The use of anyone else’s
name may result in an academic integrity review by your professor. Please label your screenshot to
receive full credit.
Take a screenshot of Your First Name and Your Last Name as the Examiner
Image 8
11
Screenshot 9– Master File Table, or $MFT within the NTFS Image in Autopsy
9.
Provide a screenshot of the Master File Table, or $MFT within the NTFS Image in
Autopsy.
Take a screenshot of the
Master File Table, or $MFT within the NTFS Image in Autopsy
12
Your preview ends here
Eager to read complete document? Join bartleby learn and gain access to the full version
- Access to all documents
- Unlimited textbook solutions
- 24/7 expert homework help
Image 9: $MFT within the NTFS Image in Autopsy
Screenshot 10– Yourname Volume Label within the FAT32 Image in Autopsy
10. Provide a screenshot of the
Yourname Volume Label within the FAT32 Image in Autopsy. The use of
anyone else’s name may result in an academic integrity review by your professor. Please label your
screenshot to receive full credit.
Take a screenshot of the
Yourname Volume Label within the FAT32 Image in Autopsy
13
Image 10: Volume Label within the FAT32 Image in Autopsy
Conclusion
Students:
In the box below, please explain the purpose of doing this lab below and explain
how in is relevant to Digital Forensics Technology and Practices. Highlight any new learning
that occurred while doing this lab.
Hint: Discuss tools and commands used in the lab.
14
Conclusion
The objective of the lab in digital forensic technology is to introduce the students to the field of forensic
imaging technology. The lab gives forensic imaging students practical practice. It is crucial to comprehend
how forensic imaging functions because if it is carried out improperly, evidence may be excluded from
consideration in court. Cybercrime investigators can utilize forensic imaging of a drive to identify and pinpoint
when, when, and how a user of a computer device conducts operations or actions on a particular device. In
cybercrime investigations, forensic imaging is crucial because it may show if a suspect attempted to hide or
destroy data. A suspect's conduct or purpose can be examined and determined via forensic imaging
(Johnson, 2022).
In this lab, we built our own operating system as a drive level for the desktop's C disk. On the H disk, a
volume level of our first name NTFS file was produced. On the I drive, FAT32 was formed. We carried out
each step to discover how to format drive photos. On the Windows command line, the mkdir C: backup
command was used to establish a C backup directory. To make a file disk image, the Windows command line
was used to run the FTK imager. The lab taught the students how to use the FTK imager to create C-backed-
up NTFS.DD files. The picture files' MD5 and SHA1 hashes were computed, and they all agreed. Data
preview is made possible by FTK imager, which also aids in evaluating potential forensic evidence. To
exclude any possibility of tampering with the original, the FTK imager copies every piece of data on a
computing device and makes a forensic image of the data (Shinder & Cross, 2008).
The master table containing the NTFS image was created and retrieved using the autopsy tool, and our
name volume hash was created using the FAT32 image. On computers or external storage media like USB
drives, the autopsy can locate and recover lost files. The autopsy tool can be used by forensic investigators
to retrieve deleted data from suspects in a cybercrime investigation (Davis, 2022).
15
Your preview ends here
Eager to read complete document? Join bartleby learn and gain access to the full version
- Access to all documents
- Unlimited textbook solutions
- 24/7 expert homework help
16
APA References
Berryhill, J. (2019, January 19). What is a "forensic image"? Bay Area Computer Forensics Expert, Investigator
& Witness.
https://www.computerforensics.com/news/what-is-a-forensic-image
Davis, P. (2022, April 18). Autopsy forensic tool review (How to use autopsy to recover deleted files). iMyFone®
| Software to Recover Data, Unlock Password, Repair System, etc.
https://www.imyfone.com/data-
recovery/autopsy-forensic-tool-review/
Forensic image. (2017, August 30). Purchase Intent Data for Enterprise Tech Sales and Marketing. TechTarget.
https://www.techtarget.com/whatis/definition/forensic-image?vgnextfmt=print
Johnson, W. (2022, May 23). Full forensic imaging vs. targeted data collections: Which one do I need?
BIA.
https://www.biaprotect.com/blog/full-forensic-imaging-vs-targeted-data-collections-which-one-do-i-
need
Shinder, L., & Cross, M. (2008). Acquiring Data, Duplicating Data, and Recovering Deleted Files. Science
Direct.
https://www.sciencedirect.com/topics/computer-science/forensic-image
17