Instructions for Assignment: Your report must include: 1. Evidence description. 2. Standard procedure (example: collection steps, imaging, chain of custody, etc) 3. Examination of NTFS file structure...

1 answer below »



Instructions for Assignment:







Your report must
include:














1.


Evidence description.







2.


Standard procedure (example:
collection steps, imaging, chain of custody, etc)







3.


Examination of NTFS file
structure (include tables for NTFS file system, description of each item)







4.


In detail explanation of $MFT
file record findings (include table showing all the attribute values and data
run)
















Question 1




(20% of
the total mark of 30)








You are a digital forensic examiner.
Your task is to process and perform a forensically sound acquisition of the
following memory card:










Graphical user interface<br><br>Description automatically generated














The SD card is formatted with

NTFS

file system.









a)


Describe your
steps in details, including specific forensic equipment, hardware and software
that you will use, to complete forensic acquisition of the USB device and
create a forensic image.









b)


How would you
examine the file system?














Question 2




(30% of
the total mark of 30)








The following is a MBR snapshots. Find
the following information for each partition.







(Hints: watch this youtube video: https://www.youtube.com/watch?v=jRj_HzbHeWU)














1.


Find Boot
indicator bits/flag (check if bootable or not)







2.


Find types of
File System Type (e.g., FAT32, NFTS, EXT3 etc.)







3.




Starting LBA Address (Relative Sectors)







4.




Size of the partitions (sector size is 512 bytes).










































Question 3 (50% of the total mark of 30)







Please examine the $MFT FILE Record
below and report on its content.








Hints:


Read chapter 5 of the textbook and week 6
lecture slides to prepare for your response. You can also look into week 8
lecture slides for the sample structure of your report.

















For conversion you can use DCode
software (


https://www.digital-detective.net/dcode/

)







You answers need to include the detail
description of the following attributes and their corresponding values.







·



Attributes x010







·



Attributes x030







·



Attributes x080


















Answered 1 days AfterSep 26, 2022

Answer To: Instructions for Assignment: Your report must include: 1. Evidence description. 2. Standard...

Aditi answered on Sep 27 2022
57 Votes
ASSIGNMENT
The gallery view of the software application shows the document that has been overwritten after it had been destroyed. It is only rational for him to concede the possibility that the There is a problem with the entry's modified timestamp in one way or another. The process of extracting a document from an archive is done on a computer that is running Windows XP. The Entry Modifie
d time stamps will always be xx:xx: xx, even if the archive was fetched to the record device at yy:yy: yy. Even during the process of generating a file on a computer, the file will normally take over the date of the device just like its Date Created time stamp. This is because the date is stored in the file's header. Zip files do not behave in any way remotely similar to this at all. In the realm of international cyber forensics, the storied time stamp called as Entry Modified has shown to be an invaluable asset in the resolution of a significant number of cases. Customers are never privy to this hidden timestamp, and very few individuals have even a basic comprehension of what it may or may not signify. As a consequence of this, they are not able to make any changes to it. People are seldom made aware of the fact that now the EntryModified timestamp has a very restricted range of validity, which is an important detail to note. It must be earlier than the date that is shown in the Date Created column; it cannot be later. (Windows Vista does not include this functionality in its operating system.) The time stamps for "Date Created" & "Date Modified" end up being identical whenever a zipper report is created. Examiner 1, who is a person who gives computer help but does not have expertise in forensics, studies the harsh force, applies document restoration software to a harsh electricity, so recovers a significant amount of data that was previously deleted. Examiner 1 does not have any prior experience in the field of forensics. Then, in his report, he adds that he was unable to view any of the recovered papers since the laptop had such a record-wiping software application linked to the machine. This is something that he acknowledges in his report. This information has been recorded as part of his file. In addition to that, when he is at the customer's location for the inspection, he utilizes the customer's computer. Examiner 1 states his view, which is recorded in his report, that owner of the computer used the most recent usage of the report-wiping software application a few days after the courtroom were attentive. Examiner 1's statement is supported by the documentation in his report. In addition to this, he asserts that the software program for deleting files deletes everything from the hard disc of a computer. Last but not least, he asserts that due to the truth, the software that erases records was upgraded to run days after the court made mention, and as a consequence, he was not able to read any of the documents that he obtained as a result of this.
Expert 2, a trained forensics examiner, also investigates the client's computer in order to evaluate the client's administrative authority. However, before making a forensic replication, Examiner 2 first eliminates the troublesome pressure and ensures that the laptop is not turned on. After that, he investigates the challenging pressure forensic duplication. He retrieves a large number of erased files and makes the observation that the only evidence of a document-wiping utility is an empty listing in the location where the document-wiping program was updated into installation. Inside of that folder, he makes the observation that the most important document that was only a device report, which has a date that is many days after the court heard about the order to renovate. After that, he finds a copy of the same model of the document-wiping program and downloads it onto a clean computer.
In order to figure out how the software...
SOLUTION.PDF

Answer To This Question Is Available To Download

Related Questions & Answers

More Questions »

Submit New Assignment

Copy and Paste Your Assignment Here