Part I Hands-On Steps
Part 1: Use WinAudit to inventory the vWorkstation
1. Figure 1 shows screen shot of system overview using WinAudit
a. Figure 1 2. Figure 2 shows screen shot of Windows Firewall findings.
b. Figure 2
3. Figure 3 shows screen shot of user accounts findings.
c. Figure 3
4. Figure 4 shows screen shot of Drive C findings.
d. Figure 4
5. Figure 5 shows screen shot of Physical Disk.
e. Figure 5
Part 2: Use DenManView to identify system devices
1. Figure 1 show screen capture of CDROM and System CMOS/real time clock.
. Figure 1
There are 89 devices identified by DenManView.
Part 3: Use Frhed to perform a byte-level file analysis
1. Figure 1 shows screen shot of Frhed view of target.abc
. Figure 1
2. Figure 2 shows screen shot of target.jpg file.
. Figure 2
3. Figure 3 shows screen shot of entire contents of the file properties dialog box.
. Figure 3
Part II Lab Assessment Questions & Answers
1. What is the main purpose of a software tool like WinAudit in computer forensics?
WinAudit is a GUI based tool that reports on a numerous aspects of running system, inclduign both volatile and non-volatile information, providing computer inventory and system configuration (Aquilina, J., & Casey, E., 2008).
2. Which item(s) generated by WinAudit would be of critical importance in a computer Forensic investigation?
I will say that some of the most important items in a computer for a forensic investigation are: Drivers, running programs, installed programs, operating system, computer name, security setting and configurations, and firewall configurations.
3. Could you run WinAudit from a flash drive or any other external media? If so, why is this important during a computer forensic investigation?
Yes, we can run WinAudit from a flash drive. Its important during a computer forensic investigation because it would prevent alter any important evidence.
4. Why would you use a tool like DevManView while performing a computer forensic investigation?
I would use DevManView because it displays the properties of all devices running in a computer that is using my network.
5. Which item(s) available from DevManView would be of critical importance in a computer forensic investigation?
The item available form DevManView that are important in a computer forensic investigation are mostly hardware, and most likely they are Hardrive and USB devices that its been use within the network.
6. What tool similar to DevManView is already present in Microsoft Windows systems?
Another tool similar to DevManView that is used in Microsoft Windows systems is WinHEX
7. Why would someone use a Hex editor during a forensic investigation?
A forensic investigator need Hex editor for analyzing file structures allowing him to go beyond the application or file, and it will allows for the viewing of all the data contained within a file including remnant of old file or even deleted files (Marcella, A., & Guillossou, F., 2012).
8. What “clue” in the Frhed examination of target.abc led you to the correct extension for that file?
The “clue” that led me to correct the Frhed examination of target.abc was the Target.jpeg.
9. Describe the contents of the target.jpg file, and the application in which it opens.
The content of the target.jpg file is a picture of a fingerprint, which let us to view the hexadecimal file as an image. The application in which it opens was Windows Photo Viewer.
10. Why do you need to keep evidence unaltered?
It’s important that we kept evidence unaltered for admissible purposes. If the evidence it’s altered it could become inadmissible in a court, changing the path and result of a digital forensic case.
Reference
Aquilina, J., & Casey, E. (2008). Malware Incident Response: Volatile Data Collection and Examination on a Live Windows System. In Malware forensics investigating and analyzing malicious code. Burlington, MA: Syngress Pub.
Marcella, A., & Guillossou, F. (2012). The Power of HEX. In Cyber forensics: From data to digital evidence. Hoboken, New Jersey: Wiley.
You May Also Find These Documents Helpful
-
1. Why do you think it is so important to use proper methods when collecting evidence from a crime scene?…
- 353 Words
- 2 Pages
Satisfactory Essays -
6. Which new forensic technology discussed in the video do you think will have the greatest impact on forensic science? Why?…
- 316 Words
- 1 Page
Satisfactory Essays -
2. Describe three ways that a crime scene can be recorded. What is a benefit of…
- 579 Words
- 2 Pages
Satisfactory Essays -
4. Why is evidence important in forensic science? What evidence was important in the episodes? Why?…
- 367 Words
- 2 Pages
Satisfactory Essays -
2. Describe three ways that a crime scene can be recorded. What is a benefit of each?…
- 462 Words
- 2 Pages
Satisfactory Essays -
The three phases of computer forensic investigations are; acquire the evidence, authenticate the evidence, and analyze the evidence. In acquiring the evidence the data is collected. Authenticating the evidence a chain of custody is used for the evidence to ensure its trustworthiness. Finally in analyzing the evidence the data is viewed and if need be a copy of the evidence can be created.…
- 285 Words
- 1 Page
Satisfactory Essays -
1. Why do you think it is so important to use proper methods when collecting evidence from a crime scene?…
- 379 Words
- 2 Pages
Good Essays -
the results of each. FTP is a protocol that is used extensively in business and social…
- 381 Words
- 3 Pages
Satisfactory Essays -
Answer: WinAudit is a great free tool that will give you a comprehensive view of the components that make up your system, including hardware, software and BIOS.…
- 414 Words
- 2 Pages
Satisfactory Essays -
6. Which new forensic technology discussed in the video do you think will have the greatest impact on forensic science? Why?…
- 258 Words
- 1 Page
Satisfactory Essays -
1. Why is the unallocated space of a Windows system so important to a forensic…
- 256 Words
- 2 Pages
Satisfactory Essays -
Under the silver platter doctrine, evidence obtained by state agents in an unreasonable search and seizure was admissible in a federal criminal trial, where no federal agent participated in a search and seizure and the state officers did not act solely on behalf of the United States (Hills, 1999). Simply put, federal officers cannot allow state police to do the dirty work, and then claim that they did not violate search and seizure rights. By analogy, no government agent can stand by, allow a private citizen to violate search and seizure strictures on the government 's behalf, and then claim innocence as to the violation (Hills, 1999).…
- 865 Words
- 4 Pages
Good Essays -
When a CPU is composed of two or more processors, each one is referred to as a(n) ________.…
- 2490 Words
- 10 Pages
Good Essays -
They collect the soil found on an item and take the whole thing to the lab to be tested; for instance, if there’s soil on the bottom of a shoe, the whole shoe is taken to the crime lab, and if a piece of clothing has a dried mud spot, it has to be placed in a paper bag so the mud doesn’t fall off and get lost.…
- 452 Words
- 2 Pages
Satisfactory Essays -
There are many challenges for a computer forensics specialist and everyone faces the same challenges. There first challenge is to find a way to examine an increasing number of digital devices, each containing an immense volume of data, in a timely manner with limited resources (Charles L Cohen, n.d.). Another challenge is the fact that offenders are finding easier ways to store data. They…
- 755 Words
- 4 Pages
Good Essays