BIT362: Digital Forensics Assignment - USB Drive Investigation
VerifiedAdded on 2022/09/11

Digital forensics
Name of the Student
Name of the University
Author Note
Paraphrase This Document

Table of Contents
Question 1:.................................................................................................................................2
Question 2:.................................................................................................................................3
Question 3:.................................................................................................................................4
Question 4:.................................................................................................................................5
Question 5:.................................................................................................................................6
Question 6:...............................................................................................................................10
Question 7:...............................................................................................................................10
Question 8:...............................................................................................................................13
References:...............................................................................................................................17

Question 1:
File on the drive:
Content in the file:
⊘ This is a preview!⊘
Do you want full access?
Subscribe today to unlock all pages.

Trusted by 1+ million students worldwide

File is deleted from the drive:
Question 2:
Pro discover:
Paraphrase This Document

The pro discover can be regarded as a disc forensic system having the capability of capturing
and analysis of the discs. It supports several Mac, Linux, and window files and uses
forensically proven methods for solving its purpose. It has the ability to locate every data on a
disc as well as protect them and report them for the legal purposes. It is a Utility tool which is
best when the person needs to analyse the entire system at once (Cameron 2018).
Autopsy:
The Computer software autopsy is a part of the Sleuth Kit, which is used for the purpose of
digital forensic investigation. It is a GUI which displays the various research results of a
forensic search and is based on the following principles:
The users can easily add new features for analysis using plugins on the previous data
sources
All modules and access features must offer consistent and standard mechanisms
It is user friendly and supports multiple users as well.
FTK Imager:
The forensic Tool kit is one of the most renowned tools used in the Forensics developed by
AccessData. It has the ability to access an entire disk or HDD in search of information
images, deleted mails and data and can even scan through files looking for particular text
strings and codes which could be potential passwords for various encryptions. It can calculate
MD5 hash values to check data integrity and save image files in multiple formats for later
use.
Question 3:
Search warrant

A digital search warrant is defined as a warrant issues for searching any electronic or
computer media files images or other details which may contain crime evidences, details of
crimes, illegal documentations, and crime instrumentalities (Easttom 2019). Those search
warrants must particularly mention the type of record to seize and also the time limit for that
seizure. It may be electronic or non-electronic in nature and whether the seized data will be
retained by the investigatory department forever or be cleared away after the closure of the
investigation is determined by the law.
Chain of custody:
This is the tool used for the purpose of the forensic which can preserve the digital
evidences that has been gathered from the various crime scenes. These are preserved in a way
in which they can be presented in the court for the purpose of the law. The chain of custody is
often referred to as the chronological documentation of the evidences and is used for
preserving the integrity of the document (Ghazinour et al. 2017).
Write blocker devices:
Write block device or forensic disc controller is a hardware specially designed for
controlling hard disk and their contents. The purpose of this device is to acquire control over
the read only access of the hard drives of the computer without damaging the contents. It is
commonly used by the forensic investigators to access hard drives containing evidences
(Holt, Bossler and Seigfried-Spellar 2015). It looks like a dongle and can fit into the port of
the computer and access the drives making it easy to use and supporting a wide range of
accessibility makes it popular.
Question 4:
In the Field of Internet Technology Digital Forensics is one of the Most Popular
technology that is used to test cybercrime. Considering the above, it can be said that digital
⊘ This is a preview!⊘
Do you want full access?
Subscribe today to unlock all pages.

Trusted by 1+ million students worldwide

forensics is a technology by which cyber-criminals can be identified. While analysing the
concept it is noticed that In the Field of Digital Forensics, data acquisition is one of the most
essential part which is primarily used to gather digital evidences in the form of digital images.
When investigating this matter, it is found that there are two types of acquisition processes,
one of which is offline acquisition (Easttom, 2019). These types of processes can generate
some information, if they can't get information from something.
Autopsy has been chosen for conducting the forensic analysis tasks as the tool is
having a GUI interface and it is easy to use. Offline forensic technique has been used as in
this technique an usb drive can be analysed without using Internet.
Question 5:
Creating image file using Autopsy:
Step 1: After opening Autopsy, the screen will pop up automatically to create a new project.
There is also option for opening an existing project. With the help of the option an existing
project can be opened.
Paraphrase This Document

Step 2: After selecting new case there will be options to input case name and base directory.
In this step I have given the case name and selected the base directory.
Step 3: After step 2, there will be an option information section that will pop up. In this
section I have given the information.

Step 4: I this step I have added the files from the local disk (USB image drive). Then I have
selected the USB drive.
The data source has been selected:
⊘ This is a preview!⊘
Do you want full access?
Subscribe today to unlock all pages.

Trusted by 1+ million students worldwide

Step 5: In this step the ingest modules will be selected:
The data source is adding:
Step 6: image file created:
Paraphrase This Document

Question 6:
There is no need to analyze the entire data disk and alter the data when using offline
digital acquisition process to create digital advancement. In this process the metadata as well
as spaces will be analysed to gather the digital evidences. While analysing this considerations
it is found that in case of any malware forensic detection the recently used files will be
analysed and from that investigation it will generate digital evidences against the criminal
incident. While investigating the benefits of this method it is noticed that this is one of fastest
data acquisition process that enhances the speed of the digital forensic practices.
Question 7:
Usually the forensic professionals opts for gathering the digital evidences by copying
the original data but in this process it does not gathers the volatile information but it analyses
the entire data and collects digital evidences (Cameron, 2018). For getting the hash value, I
have selected the image file first from Autopsy:

Then I right clicked on the image and select view summary information:
⊘ This is a preview!⊘
Do you want full access?
Subscribe today to unlock all pages.

Trusted by 1+ million students worldwide

The hash value of the image is:
Paraphrase This Document

Question 8:
For restoring the deleted text file via Autopsy, I have discovered the file from the deleted
files section.
Step 1: Select the deleted files section from the tab:

Step 2: There will be 2 options. One is File systems and the other one is all section. Select All
from there.
⊘ This is a preview!⊘
Do you want full access?
Subscribe today to unlock all pages.

Trusted by 1+ million students worldwide

Step 3: Open the all section find the deleted file. The deleted file found.
Hex value of the deleted file:
Paraphrase This Document


References:
Cameron, L., 2018. Future of digital forensics faces six security challenges in fighting
borderless cybercrime and dark web tools.
Easttom, C., 2019. Computer security fundamentals. Pearson IT Certification.
Ghazinour, K., Vakharia, D.M., Kannaji, K.C. and Satyakumar, R., 2017, September. A study
on digital forensic tools. In 2017 IEEE International Conference on Power, Control, Signals
and Instrumentation Engineering (ICPCSI) (pp. 3136-3142). IEEE.
Holt, T.J., Bossler, A.M. and Seigfried-Spellar, K.C., 2015. Cybercrime and digital
forensics: An introduction. Routledge.
⊘ This is a preview!⊘
Do you want full access?
Subscribe today to unlock all pages.

Trusted by 1+ million students worldwide
Related Documents

Your All-in-One AI-Powered Toolkit for Academic Success.
+13062052269
info@desklib.com
Available 24*7 on WhatsApp / Email
© 2024 | Zucol Services PVT LTD | All rights reserved.