Part I Hands-On Steps
Part 1: Use WinAudit to inventory the vWorkstation
1. Figure 1 shows screen shot of system overview using WinAudit
a. Figure 1 2. Figure 2 shows screen shot of Windows Firewall findings.
b. Figure 2
3. Figure 3 shows screen shot of user accounts findings.
c. Figure 3
4. Figure 4 shows screen shot of Drive C findings.
d. Figure 4
5. Figure 5 shows screen shot of Physical Disk.
e. Figure 5
Part 2: Use DenManView to identify system devices
1. Figure 1 show screen capture of CDROM and System CMOS/real time clock.
. Figure 1
There are 89 devices identified by DenManView.
Part 3: Use Frhed to perform a byte-level file analysis
1. Figure 1 shows screen shot of Frhed view of target.abc
. Figure 1
2. Figure 2 shows screen shot of target.jpg file.
. Figure 2
3. Figure 3 shows screen shot of entire contents of the file properties dialog box.
. Figure 3
Part II Lab Assessment Questions & Answers
1. What is the main purpose of a software tool like WinAudit in computer forensics?
WinAudit is a GUI based tool that reports on a numerous aspects of running system, inclduign both volatile and non-volatile information, providing computer inventory and system configuration (Aquilina, J., & Casey, E., 2008).
2. Which item(s) generated by WinAudit would be of critical importance in a computer Forensic investigation?
I will say that some of the most important items in a computer for a forensic investigation are: Drivers, running programs, installed programs, operating system, computer name, security setting and configurations, and firewall configurations.
3. Could you run WinAudit from a flash drive or any other external media? If so, why is this important during a computer forensic investigation?
Yes, we can run WinAudit from a flash drive. Its important during a computer forensic investigation because it would prevent alter any important evidence.
4. Why would you use a tool like DevManView while performing a computer forensic investigation?
I would use DevManView because it displays the properties of all devices running in a computer that is using my network.
5. Which item(s) available from DevManView would be of critical importance in a computer forensic investigation?
The item available form DevManView that are important in a computer forensic investigation are mostly hardware, and most likely they are Hardrive and USB devices that its been use within the network.
6. What tool similar to DevManView is already present in Microsoft Windows systems?
Another tool similar to DevManView that is used in Microsoft Windows systems is WinHEX
7. Why would someone use a Hex editor during a forensic investigation?
A forensic investigator need Hex editor for analyzing file structures allowing him to go beyond the application or file, and it will allows for the viewing of all the data contained within a file including remnant of old file or even deleted files (Marcella, A., & Guillossou, F., 2012).
8. What “clue” in the Frhed examination of target.abc led you to the correct extension for that file?
The “clue” that led me to correct the Frhed examination of target.abc was the Target.jpeg.
9. Describe the contents of the target.jpg file, and the application in which it opens.
The content of the target.jpg file is a picture of a fingerprint, which let us to view the hexadecimal file as an image. The application in which it opens was Windows Photo Viewer.
10. Why do you need to keep evidence unaltered?
It’s important that we kept evidence unaltered for admissible purposes. If the evidence it’s altered it could become inadmissible in a court, changing the path and result of a digital forensic case.
Reference
Aquilina, J., & Casey, E. (2008). Malware Incident Response: Volatile Data Collection and Examination on a Live Windows System. In Malware forensics investigating and analyzing malicious code. Burlington, MA: Syngress Pub.
Marcella, A., & Guillossou, F. (2012). The Power of HEX. In Cyber forensics: From data to digital evidence. Hoboken, New Jersey: Wiley.
You May Also Find These Documents Helpful
-
272. Newman, R. (2007). Computer Forensics: Evidence Collection and Managment. Boca Raton FL: Taylor & Francis Group. LLC.…
- 4846 Words
- 17 Pages
Powerful Essays -
2. Describe three ways that a crime scene can be recorded. What is a benefit of each?…
- 786 Words
- 2 Pages
Satisfactory Essays -
One might think that a hospitals soul operations is to provide doctors and nurses to assist patients with their sickness and diseases. However, there is a ton of operations and systems that go on in the background. At Patton-Fuller Community Hospital, they split up their business information systems in four ways. Patton-Fuller Community Hospital use this system to improve communication and collaboration between senior management, employees, doctors, nurses and patients. In addition, the current system is suppose to improve the efficiency of hospital operations, relationships with current and future patients, and assist senior executives in managing hospital finances.…
- 1212 Words
- 5 Pages
Better Essays -
the results of each. FTP is a protocol that is used extensively in business and social…
- 381 Words
- 3 Pages
Satisfactory Essays -
1. Why is the unallocated space of a Windows system so important to a forensic…
- 256 Words
- 2 Pages
Satisfactory Essays -
6. Which new forensic technology discussed in the video do you think will have the greatest impact on forensic science? Why?…
- 316 Words
- 1 Page
Satisfactory Essays -
Under the silver platter doctrine, evidence obtained by state agents in an unreasonable search and seizure was admissible in a federal criminal trial, where no federal agent participated in a search and seizure and the state officers did not act solely on behalf of the United States (Hills, 1999). Simply put, federal officers cannot allow state police to do the dirty work, and then claim that they did not violate search and seizure rights. By analogy, no government agent can stand by, allow a private citizen to violate search and seizure strictures on the government 's behalf, and then claim innocence as to the violation (Hills, 1999).…
- 865 Words
- 4 Pages
Good Essays -
Many times, computer forensics practitioners work with traditional forensics experts in criminal investigations to reveal evidence. With frequent work experiences with forensics experts and lawyers, having a general knowledge of relevant laws and ethics is a nice complement to any computer forensics practitioner’s skill set. Furthermore, as many audits are conducted on businesses and illegal organizations are done electronically, computer forensics experts may want to have working knowledge in accounting and/or finance in order to prepare for such jobs.…
- 524 Words
- 3 Pages
Satisfactory Essays -
2. Describe three ways that a crime scene can be recorded. What is a benefit of each?…
- 758 Words
- 2 Pages
Good Essays -
1. What is the main purpose of a software tool like WinAudit in computer forensics?…
- 414 Words
- 2 Pages
Satisfactory Essays -
2. Why do you think forensic science has been increasingly used by the criminal justice system?…
- 658 Words
- 2 Pages
Satisfactory Essays -
6. Which new forensic technology discussed in the video do you think will have the greatest impact on forensic science? Why?…
- 258 Words
- 1 Page
Satisfactory Essays -
They collect the soil found on an item and take the whole thing to the lab to be tested; for instance, if there’s soil on the bottom of a shoe, the whole shoe is taken to the crime lab, and if a piece of clothing has a dried mud spot, it has to be placed in a paper bag so the mud doesn’t fall off and get lost.…
- 452 Words
- 2 Pages
Satisfactory Essays -
2. Describe three ways that a crime scene can be recorded. What is a benefit of each?…
- 847 Words
- 4 Pages
Good Essays -
After the preservation phase, forensics are required to locate and identify any evidence that can be used to aid the crime case. There are several locations where evidence are usually found such as in the hard drive on the user’s personal computer, laptop, smart phone or tablet (ACPO, 2012). It is also critical that forensics are aware of the intention of the particular investigation. This aids in the forensics' efforts of locating digital evidences that are relevant to the case. For example, in the case of a server intrusion, forensics should look out for signs such as a rootkit installation, analyze configuration files, logs files and etc. These are possible locations and processes where traces of evidence can be picked out from (Carrier and Spafford, 2003).…
- 257 Words
- 2 Pages
Satisfactory Essays