LAB3_Digital Forensics Technology and Practices_WORKSHEET2

docx

School

University of Maryland, University College *

*We aren’t endorsed by this school

Course

640

Subject

Information Systems

Date

Dec 6, 2023

Type

docx

Pages

15

Uploaded by joespady4u25

Report
Name: XXXXX Semester: Summer Year: 2023 Section Number: 7621 Lab 3 Worksheet Digital Forensics Technology and Practices Table of Contents Introduction ............................................................................................................................................................... 2 Screenshot 1 – Yourname Displayed in the Server Manager Dashboard ................................................................... 3 Screenshot 2 – Yourname Displayed in the IIS Server Installation .............................................................................. 4 Screenshot 3 –YOURNAME FTP Site in Internet Information Services ....................................................................... 5 Screenshot 4 – YOURNAME echoed into the iisstart.htm file .................................................................................... 6 Screenshot 5 – Yourname Windows Website ............................................................................................................. 7 Screenshot 6 – FTP File within the C:\Inetpub\ftproot Directory ............................................................................... 8 Screenshot 7– Yourname FTPsite ............................................................................................................................... 9 Screenshot 8– Yourname Linux Website .................................................................................................................. 10 Screenshot 9 – Yourname Windows Website using 10.X.X.X IP ............................................................................... 11 Screenshot 10 –Use grep to find Yourname in the auth.log file ............................................................................... 12 Conclusion ............................................................................................................................................................... 13 APA References ........................................................................................................................................................ 14 1
Introduction Students: In the box below, please explain the purpose of using the Logs and Web Logs and explain how they are relevant to Digital Forensics Technology and Practices. Introduction Records of events that happen on a computer system or network are kept in logs and weblogs. They are frequently used for monitoring and troubleshooting, but they are also essential for digital forensics. To find proof of illegal conduct or to assist legal procedures, digital forensics examines digital devices and systems using scientific methodologies (The security advantages of audit logging, n.d.). Logs may be used in forensic investigations to reconstruct the timeline of events on a system. The reason for an occurrence, such as a data breach or illegal access to a system, may be ascertained using this. A log may, for instance, reveal that a person signed into a system at a certain moment, and that a file was removed a short while afterwards. With the use of this information, an incident chronology and prospective suspects may be created. Forensic investigations can make use of web logs, commonly referred to as access logs. These logs keep track of details about requests made to a web server, including the IP address of the client, the date and time of the request, and the resource requested (Konov, 2022). This data may be used to spot patterns of behavior, such as repeatedly trying to access the same site from the same IP address. This can be helpful in narrowing down the scope of an incident or identifying prospective culprits. Logs may be utilized in proactive monitoring systems to find and address possible events in addition to being used in forensic investigations. It's referred to as log management. When specified events occur, such as repeated failed login attempts or access to a critical resource, log management systems can be set up to notify administrators (Bloom, 2017). As a result, administrators can respond to possible events swiftly and lessen their effects. 2
3
Your preview ends here
Eager to read complete document? Join bartleby learn and gain access to the full version
  • Access to all documents
  • Unlimited textbook solutions
  • 24/7 expert homework help
Screenshot 1 – Yourname Displayed in the Server Manager Dashboard 1. When you look at the server manager dashboard, the computer name should be Your First Name. The use of anyone else’s name may result in an academic integrity review by your professor. Please label your screenshot to receive full credit. Take a screenshot of the Your Name as the Computer Name Displayed in the Server Manager Dashboard Image 1: my Name as the Computer Name Displayed in the Server Manager Dashboard 4
Screenshot 2 – Yourname Displayed in the IIS Server Installation 2. When you look at the server IIS Server Installation, the computer name should be Your First Name. The use of anyone else’s name may result in an academic integrity review by your professor. Please label your screenshot to receive full credit. Take a screenshot of the Your Name as the Computer Name Displayed in the IIS Server Installation Image 2: my name as the Computer Name Displayed in the IIS Server Installation 5
Screenshot 3 –YOURNAME FTP Site in Internet Information Services 3. The Name of the FTP Site created in Internet Information Services should match your first name. The use of anyone else’s name may result in an academic integrity review by your professor. Please label your screenshot to receive full credit. Take a screenshot of Yourname FTP Site being created in Internet Information Services Image 3: my name FTP Site being created in Internet Information Services 6
Your preview ends here
Eager to read complete document? Join bartleby learn and gain access to the full version
  • Access to all documents
  • Unlimited textbook solutions
  • 24/7 expert homework help
Screenshot 4 – YOURNAME echoed into the iisstart.htm file 4. The Name within the iisstart.htm file should be your first name. The use of anyone else’s name may result in an academic integrity review by your professor. Please label your screenshot to receive full credit. Take a screenshot of the YOURNAME echoed into the iisstart.htm file Image 4: My name echoed into the iisstart.htm file 7
Screenshot 5 – Yourname Windows Website 5. The Windows Website should have first name. The use of anyone else’s name may result in an academic integrity review by your professor. Please label your screenshot to receive full credit. Take a screenshot of the Yourname Website Image 5: My name Website 8
Screenshot 6 – FTP File within the C:\Inetpub\ftproot Directory 6. The Name within the FTP file should be your first name. The use of anyone else’s name may result in an academic integrity review by your professor. Please label your screenshot to receive full credit. Take a screenshot of the FTP File within the C:\Inetpub\ftproot Directory Image 6: my name of the FTP File within the C:\Inetpub\ftproot Directory 9
Your preview ends here
Eager to read complete document? Join bartleby learn and gain access to the full version
  • Access to all documents
  • Unlimited textbook solutions
  • 24/7 expert homework help
Screenshot 7– Yourname FTPsite 7. The Windows FTPsite should have first name. The use of anyone else’s name may result in an academic integrity review by your professor. Please label your screenshot to receive full credit. Take a screenshot of the Yourname FTPsite Image 7: my name FTPsite 10
Screenshot 8– Yourname Linux Website 8. The Linux Website should have first name. The use of anyone else’s name may result in an academic integrity review by your professor. Please label your screenshot to receive full credit. Take a screenshot of the Yourname Linux Website 11
Screenshot 9 – Yourname Windows Website using 10.X.X.X IP 9. The Windows Website should have first name. The use of anyone else’s name may result in an academic integrity review by your professor. Please label your screenshot to receive full credit. Take a screenshot of the Yourname Website using the 10.X.X.X IP address 12
Your preview ends here
Eager to read complete document? Join bartleby learn and gain access to the full version
  • Access to all documents
  • Unlimited textbook solutions
  • 24/7 expert homework help
Screenshot 10 –Use grep to find Yourname in the auth.log file 10. The Name in the auth.log file should match your first name. The use of anyone else’s name may result in an academic integrity review by your professor. Please label your screenshot to receive full credit. Take a screenshot of the Yourname in the auth.log file Conclusion Students: In the box below, please explain the purpose of doing this lab below and explain how in is relevant to Digital Forensics Technology and Practices. Highlight any new learning that occurred while doing this lab. Hint: Discuss tools and commands used in the lab. Conclusion The ability to obtain practical experience examining and interpreting logs makes practicing with logs and weblogs in a lab setting extremely relevant to digital forensics. By doing so, they will be better able to comprehend the data recorded in the logs and how to use it to spot behavioral trends and probable suspects. The ability to swiftly and properly examine logs is crucial for forensic investigators and security professionals who need to respond to incidents and maintain the security of digital systems. Practice labs also assist people in developing the abilities needed to organize and make sense of a big quantity of data, which is essential in digital forensics due to the enormous amount of log data that is continuously created. Developing skills in digital forensics and safeguarding digital systems require practice with logs and weblogs in a lab environment (Faircloth, 2021). 13
In conclusion, logs and web logs are essential to the technology and procedures of digital forensics. They offer a history of what happened, which may be used to reconstruct what happened in what order on a system and pinpoint probable suspects. They are also employed in system monitoring to proactively identify and address possible issues. Forensic investigators and security experts rely heavily on logs and weblogs while maintaining the security of digital systems and looking into occurrences. APA References Students: Please list at least 5 relevant APA References. Bloom, M. (2017, May 4). The importance of logs. Sumo Logic. Retrieved August 7, 2023, from https://www.sumologic.com/blog/importance-of-logs/ 14
Faircloth, C. (2021, October 6). The importance of log reviews - professionally evil insights.Home. Retrieved August 7, 2023, 2023, from https://www.secureideas.com/blog/2018/05/the- importance-of-log-reviews.html Konov, K. (2022, October 25). The importance of Website & Server Logs. Sucuri Blog. Retrieved August 7, 2023, from https://blog.sucuri.net/2022/08/importance-of-website-logs- forsecurity.html#:~:text=How%20website%20logs%20complement%20your%20security %201%20Keep,try%20to%20bruteforce%20your%20login%20pages%20More%20items Log sources for Digital Forensics: Windows and linux. LetsDefend Blue Team Blog. (2022, March 21).Retrieved August 7, 2023, from https://letsdefend.io/blog/log-sources-for-digital- forensicswindowsandlinux/#:~:textLog%20Sources%20for%20Digital%20Forensics%3A %20Windows%20and%20Linux,Linux%20Logs%20...%206%20Linux%20System%20Logs%20 The security benefits of audit logging. SSL Digital Certificate Authority. (n.d.). Retrieved August 7,2023, from https://www.digicert.com/blog/the-security-benefits-of-audit-logging#:~:text=Audit %20Logging%20Reinforces%20Enterprise%20Security%201%20Detect%20Security,occurred. %20...%203%20Aid%20in%20Recovery%20Processes%20 15
Your preview ends here
Eager to read complete document? Join bartleby learn and gain access to the full version
  • Access to all documents
  • Unlimited textbook solutions
  • 24/7 expert homework help