{"id":34335,"date":"2024-09-19T22:28:12","date_gmt":"2024-09-19T12:28:12","guid":{"rendered":"https:\/\/myassignmenthelp.info\/assignments\/?p=34335"},"modified":"2024-09-19T22:28:13","modified_gmt":"2024-09-19T12:28:13","slug":"digital-forensics-technology-and-practices-2320717","status":"publish","type":"post","link":"https:\/\/myassignmenthelp.info\/assignments\/digital-forensics-technology-and-practices-2320717\/","title":{"rendered":"Digital Forensics Technology and Practices-2320717"},"content":{"rendered":"<p><div class=\"ppw-restricted-content\"><\/p>\n\n\n\n<h1 class=\"wp-block-heading\"><strong>Introduction<\/strong><strong><\/strong><\/h1>\n\n\n\n<p><strong>Students: <\/strong>In the box below, please explain the purpose of Hashing and explain how it is relevant to Digital Forensics Technology and Practices.<\/p>\n\n\n\n<figure class=\"wp-block-table\"><table><tbody><tr><td>Introduction<\/td><\/tr><tr><td>Hashing is important because it assists in the verification of data integrity as the unique hash value for each data can be used to detect any small change in the data. It is relevant in Digital forensics as it enables the investigators to detect whether the digital evidence has been tampered with by alteration or whether it has been corrupted. The integrity of the digital evidence is maintained by making a comparison of the original file\u2019s hash value and the hash value of the files after the investigation to ensure it\u2019s the same indicating that the evidence has not been tampered with.<\/td><\/tr><\/tbody><\/table><\/figure>\n\n\n\n<h1 class=\"wp-block-heading\"><strong>Screenshot 1 \u2013 Yourname Displayed as the Hostname<\/strong><strong><\/strong><\/h1>\n\n\n\n<p>When you look at the hostname of the computer, the computer name should be Your First Name. The use of anyone else\u2019s name may result in an academic integrity review by your professor. Please label your screenshot to receive full credit.<\/p>\n\n\n\n<p><strong>Take a screenshot of the Your Name as the Computer Name as the Hostname \u00a0<\/strong><\/p>\n\n\n\n<figure class=\"wp-block-image size-full\"><a href=\"https:\/\/myassignmenthelp.info\/assignments\/wp-content\/uploads\/2024\/09\/image-6.png\"><img loading=\"lazy\" decoding=\"async\" width=\"724\" height=\"486\" src=\"https:\/\/myassignmenthelp.info\/assignments\/wp-content\/uploads\/2024\/09\/image-6.png\" alt=\"\" class=\"wp-image-34336\" srcset=\"https:\/\/myassignmenthelp.info\/assignments\/wp-content\/uploads\/2024\/09\/image-6.png 724w, https:\/\/myassignmenthelp.info\/assignments\/wp-content\/uploads\/2024\/09\/image-6-300x201.png 300w\" sizes=\"auto, (max-width: 724px) 100vw, 724px\" \/><\/a><\/figure>\n\n\n\n<h1 class=\"wp-block-heading\"><strong>Screenshot 2 \u2013 Yourname file hashed with Sigcheck&nbsp;&nbsp;&nbsp;<\/strong><strong><\/strong><\/h1>\n\n\n\n<p>Take a screenshot of the hostname.txt file hashed with sigcheck. The use of anyone else\u2019s name may result in an academic integrity review by your professor. Also, it is mathematically possible that you and another student could have the same MD5 hash for your hostname text file. Please label your screenshot to receive full credit.<\/p>\n\n\n\n<p><strong>Take a screenshot of the yourname.txt file hashed with sigcheck<\/strong><\/p>\n\n\n\n<figure class=\"wp-block-image size-full\"><a href=\"https:\/\/myassignmenthelp.info\/assignments\/wp-content\/uploads\/2024\/09\/image-7.png\"><img loading=\"lazy\" decoding=\"async\" width=\"724\" height=\"573\" src=\"https:\/\/myassignmenthelp.info\/assignments\/wp-content\/uploads\/2024\/09\/image-7.png\" alt=\"\" class=\"wp-image-34337\" srcset=\"https:\/\/myassignmenthelp.info\/assignments\/wp-content\/uploads\/2024\/09\/image-7.png 724w, https:\/\/myassignmenthelp.info\/assignments\/wp-content\/uploads\/2024\/09\/image-7-300x237.png 300w\" sizes=\"auto, (max-width: 724px) 100vw, 724px\" \/><\/a><\/figure>\n\n\n\n<h1 class=\"wp-block-heading\"><strong>Screenshot 3 \u2013Yourname file hashed with HashTab<\/strong><strong><\/strong><\/h1>\n\n\n\n<p>Take a screenshot of the yourname.txt file hashed with Hashtab. The use of anyone else\u2019s name may result in an academic integrity review by your professor. Please label your screenshot to receive full credit.<\/p>\n\n\n\n<p><strong>Take a screenshot of the yourname.txt file hashed with Hashtab<\/strong><\/p>\n\n\n\n<figure class=\"wp-block-image size-full\"><a href=\"https:\/\/myassignmenthelp.info\/assignments\/wp-content\/uploads\/2024\/09\/image-8.png\"><img loading=\"lazy\" decoding=\"async\" width=\"724\" height=\"577\" src=\"https:\/\/myassignmenthelp.info\/assignments\/wp-content\/uploads\/2024\/09\/image-8.png\" alt=\"\" class=\"wp-image-34338\" srcset=\"https:\/\/myassignmenthelp.info\/assignments\/wp-content\/uploads\/2024\/09\/image-8.png 724w, https:\/\/myassignmenthelp.info\/assignments\/wp-content\/uploads\/2024\/09\/image-8-300x239.png 300w\" sizes=\"auto, (max-width: 724px) 100vw, 724px\" \/><\/a><\/figure>\n\n\n\n<h1 class=\"wp-block-heading\"><strong>Screenshot 4 \u2013 Yourname file hashed with HashCalc&nbsp;<\/strong><\/h1>\n\n\n\n<p>Take a screenshot of the yourname.txt file hashed with hashcalc. The use of anyone else\u2019s name may result in an academic integrity review by your professor. Please label your screenshot to receive full credit.<\/p>\n\n\n\n<p><strong>Take a screenshot of the yourname.txt file hashed with Hashcalc<\/strong><\/p>\n\n\n\n<figure class=\"wp-block-image size-full\"><a href=\"https:\/\/myassignmenthelp.info\/assignments\/wp-content\/uploads\/2024\/09\/image-9.png\"><img loading=\"lazy\" decoding=\"async\" width=\"724\" height=\"578\" src=\"https:\/\/myassignmenthelp.info\/assignments\/wp-content\/uploads\/2024\/09\/image-9.png\" alt=\"\" class=\"wp-image-34339\" srcset=\"https:\/\/myassignmenthelp.info\/assignments\/wp-content\/uploads\/2024\/09\/image-9.png 724w, https:\/\/myassignmenthelp.info\/assignments\/wp-content\/uploads\/2024\/09\/image-9-300x240.png 300w\" sizes=\"auto, (max-width: 724px) 100vw, 724px\" \/><\/a><\/figure>\n\n\n\n<h1 class=\"wp-block-heading\"><strong>Screenshot 5 \u2013 MD5 of Yourname File in \/usr\/share\/windows-binaries&nbsp;<\/strong><strong><\/strong><\/h1>\n\n\n\n<h1 class=\"wp-block-heading\"><strong>&nbsp;<\/strong><\/h1>\n\n\n\n<p>The file in \/usr\/share\/windows-binaries should have first name. The use of anyone else\u2019s name may result in an academic integrity review by your professor. Please label your screenshot to receive full credit.<\/p>\n\n\n\n<h1 class=\"wp-block-heading\"><strong>&nbsp;<\/strong><\/h1>\n\n\n\n<p><strong>Take a screenshot of the MD5 Hash of the Yourname File in \/usr\/share\/windows-binaries<\/strong><\/p>\n\n\n\n<figure class=\"wp-block-image size-full\"><a href=\"https:\/\/myassignmenthelp.info\/assignments\/wp-content\/uploads\/2024\/09\/image-10.png\"><img loading=\"lazy\" decoding=\"async\" width=\"724\" height=\"333\" src=\"https:\/\/myassignmenthelp.info\/assignments\/wp-content\/uploads\/2024\/09\/image-10.png\" alt=\"\" class=\"wp-image-34340\" srcset=\"https:\/\/myassignmenthelp.info\/assignments\/wp-content\/uploads\/2024\/09\/image-10.png 724w, https:\/\/myassignmenthelp.info\/assignments\/wp-content\/uploads\/2024\/09\/image-10-300x138.png 300w\" sizes=\"auto, (max-width: 724px) 100vw, 724px\" \/><\/a><\/figure>\n\n\n\n<h1 class=\"wp-block-heading\"><strong>Screenshot 6\u2013 SHA1 hash of Yourname File in \/usr\/share\/windows-binaries&nbsp;<\/strong><strong><\/strong><\/h1>\n\n\n\n<h1 class=\"wp-block-heading\"><strong>&nbsp;<\/strong><\/h1>\n\n\n\n<p>Provide the SHA1 hash of the yourname file in \/usr\/share\/windows-binaries directory. The use of anyone else\u2019s name may result in an academic integrity review by your professor. Please label your screenshot to receive full credit.<\/p>\n\n\n\n<h1 class=\"wp-block-heading\"><strong>&nbsp;<\/strong><\/h1>\n\n\n\n<p><strong>Take a screenshot of the SHA1 hash of the Yourname File in \/usr\/share\/windows-binaries<\/strong><\/p>\n\n\n\n<figure class=\"wp-block-image size-full\"><a href=\"https:\/\/myassignmenthelp.info\/assignments\/wp-content\/uploads\/2024\/09\/image-11.png\"><img loading=\"lazy\" decoding=\"async\" width=\"724\" height=\"263\" src=\"https:\/\/myassignmenthelp.info\/assignments\/wp-content\/uploads\/2024\/09\/image-11.png\" alt=\"\" class=\"wp-image-34341\" srcset=\"https:\/\/myassignmenthelp.info\/assignments\/wp-content\/uploads\/2024\/09\/image-11.png 724w, https:\/\/myassignmenthelp.info\/assignments\/wp-content\/uploads\/2024\/09\/image-11-300x109.png 300w\" sizes=\"auto, (max-width: 724px) 100vw, 724px\" \/><\/a><\/figure>\n\n\n\n<h1 class=\"wp-block-heading\"><strong>Screenshot 7\u2013 SHA256 hash of Yourname File in \/usr\/share\/windows-binaries&nbsp;<\/strong><strong><\/strong><\/h1>\n\n\n\n<h1 class=\"wp-block-heading\"><strong>&nbsp;<\/strong><\/h1>\n\n\n\n<p>Provide the SHA256 hash of the yourname file in \/usr\/share\/windows-binaries directory. The use of anyone else\u2019s name may result in an academic integrity review by your professor. Please label your screenshot to receive full credit.<\/p>\n\n\n\n<h1 class=\"wp-block-heading\"><strong>&nbsp;<\/strong><\/h1>\n\n\n\n<p><strong>Take a screenshot of the SHA256 hash of the Yourname File in \/usr\/share\/windows-binaries<\/strong><\/p>\n\n\n\n<figure class=\"wp-block-image size-full\"><a href=\"https:\/\/myassignmenthelp.info\/assignments\/wp-content\/uploads\/2024\/09\/image-12.png\"><img loading=\"lazy\" decoding=\"async\" width=\"724\" height=\"342\" src=\"https:\/\/myassignmenthelp.info\/assignments\/wp-content\/uploads\/2024\/09\/image-12.png\" alt=\"\" class=\"wp-image-34342\" srcset=\"https:\/\/myassignmenthelp.info\/assignments\/wp-content\/uploads\/2024\/09\/image-12.png 724w, https:\/\/myassignmenthelp.info\/assignments\/wp-content\/uploads\/2024\/09\/image-12-300x142.png 300w\" sizes=\"auto, (max-width: 724px) 100vw, 724px\" \/><\/a><\/figure>\n\n\n\n<h1 class=\"wp-block-heading\"><strong>Screenshot 8\u2013 SHA384 hash of Yourname File in \/usr\/share\/windows-binaries&nbsp;<\/strong><strong><\/strong><\/h1>\n\n\n\n<h1 class=\"wp-block-heading\"><strong>&nbsp;<\/strong><\/h1>\n\n\n\n<p>Provide the SHA384 hash of the yourname file in \/usr\/share\/windows-binaries directory. The use of anyone else\u2019s name may result in an academic integrity review by your professor. Please label your screenshot to receive full credit.<\/p>\n\n\n\n<p><strong>Take a screenshot of the SHA384 hash of the Yourname File in \/usr\/share\/windows-binaries<\/strong><\/p>\n\n\n\n<figure class=\"wp-block-image size-full\"><a href=\"https:\/\/myassignmenthelp.info\/assignments\/wp-content\/uploads\/2024\/09\/image-13.png\"><img loading=\"lazy\" decoding=\"async\" width=\"724\" height=\"309\" src=\"https:\/\/myassignmenthelp.info\/assignments\/wp-content\/uploads\/2024\/09\/image-13.png\" alt=\"\" class=\"wp-image-34343\" srcset=\"https:\/\/myassignmenthelp.info\/assignments\/wp-content\/uploads\/2024\/09\/image-13.png 724w, https:\/\/myassignmenthelp.info\/assignments\/wp-content\/uploads\/2024\/09\/image-13-300x128.png 300w\" sizes=\"auto, (max-width: 724px) 100vw, 724px\" \/><\/a><\/figure>\n\n\n\n<h1 class=\"wp-block-heading\"><strong>Screenshot 9\u2013 SHA512 hash of Yourname File in \/usr\/share\/windows-binaries&nbsp;<\/strong><strong><\/strong><\/h1>\n\n\n\n<h1 class=\"wp-block-heading\"><strong>&nbsp;<\/strong><\/h1>\n\n\n\n<p>Provide the SHA512 hash of the yourname file in \/usr\/share\/windows-binaries directory. The use of anyone else\u2019s name may result in an academic integrity review by your professor. Please label your screenshot to receive full credit.<\/p>\n\n\n\n<h1 class=\"wp-block-heading\"><strong>&nbsp;<\/strong><\/h1>\n\n\n\n<p><strong>Take a screenshot of the SHA512 hash of the Yourname File in \/usr\/share\/windows-binaries<\/strong><\/p>\n\n\n\n<figure class=\"wp-block-image size-full\"><a href=\"https:\/\/myassignmenthelp.info\/assignments\/wp-content\/uploads\/2024\/09\/image-14.png\"><img loading=\"lazy\" decoding=\"async\" width=\"724\" height=\"311\" src=\"https:\/\/myassignmenthelp.info\/assignments\/wp-content\/uploads\/2024\/09\/image-14.png\" alt=\"\" class=\"wp-image-34344\" srcset=\"https:\/\/myassignmenthelp.info\/assignments\/wp-content\/uploads\/2024\/09\/image-14.png 724w, https:\/\/myassignmenthelp.info\/assignments\/wp-content\/uploads\/2024\/09\/image-14-300x129.png 300w\" sizes=\"auto, (max-width: 724px) 100vw, 724px\" \/><\/a><\/figure>\n\n\n\n<h1 class=\"wp-block-heading\"><strong>Screenshot 10 \u2013 Virustotal Statistics&nbsp;<\/strong><strong><\/strong><\/h1>\n\n\n\n<h1 class=\"wp-block-heading\"><strong>&nbsp;<\/strong><\/h1>\n\n\n\n<p>Provide the virus total statistics. Timestamps from a previous semester or a different name may result in an academic integrity review by your professor. Please label your screenshot to receive full credit.<\/p>\n\n\n\n<h1 class=\"wp-block-heading\"><strong>&nbsp;<\/strong><\/h1>\n\n\n\n<p><strong>Take a screenshot of your Virustotal screenshot with the timestamp from this semester.<\/strong><\/p>\n\n\n\n<figure class=\"wp-block-image size-full\"><a href=\"https:\/\/myassignmenthelp.info\/assignments\/wp-content\/uploads\/2024\/09\/image-15.png\"><img loading=\"lazy\" decoding=\"async\" width=\"724\" height=\"583\" src=\"https:\/\/myassignmenthelp.info\/assignments\/wp-content\/uploads\/2024\/09\/image-15.png\" alt=\"\" class=\"wp-image-34345\" srcset=\"https:\/\/myassignmenthelp.info\/assignments\/wp-content\/uploads\/2024\/09\/image-15.png 724w, https:\/\/myassignmenthelp.info\/assignments\/wp-content\/uploads\/2024\/09\/image-15-300x242.png 300w\" sizes=\"auto, (max-width: 724px) 100vw, 724px\" \/><\/a><\/figure>\n\n\n\n<p><h1><b><span style=\"mso-spacerun:'yes';font-family:Cambria;color:rgb(54,95,145);\nfont-weight:bold;font-size:14.0000pt;\">Conclusion\u00a0<\/span><\/b><b style=\"mso-bidi-font-weight:normal\"><span style=\"mso-spacerun:'yes';font-family:Calibri;mso-ansi-font-weight:bold;\nfont-size:12.0000pt;\">\u00a0<\/span><\/b><\/h1><p class=\"MsoBodyText\" style=\"margin-right:57.5000pt;margin-left:35.0000pt;line-height:114%;\"><a href=\"Students: In the box below, please explain the purpose of doing this lab below and explain how in is relevant to Digital Forensics Technology and Practices. Highlight any new learning that occurred while doing this lab.Hint: Discuss tools and commands used in the lab.\"><b><span style=\"mso-spacerun:'yes';font-family:Calibri;font-weight:bold;\nfont-size:12.0000pt;\">Students: <\/span><\/b><span style=\"mso-spacerun:'yes';font-family:Calibri;font-size:12.0000pt;\">In the box below, please explain the purpose of doing this lab below and explain how in is relevant to Digital Forensics Technology and Practices. Highlight any new learning that occurred while doing this lab.<\/span><span style=\"mso-spacerun:'yes';font-family:Calibri;font-size:12.0000pt;\"><\/span><b><span style=\"mso-spacerun:'yes';font-family:Calibri;font-weight:bold;\nfont-size:12.0000pt;\">Hint: Discuss tools and commands used in the lab.<\/span><\/b><span style=\"mso-spacerun:'yes';font-family:Symbol;mso-fareast-font-family:Calibri;\nmso-bidi-font-family:Calibri;font-size:11.0000pt;\"><\/span><\/a><span style=\"mso-spacerun:'yes';font-family:Symbol;mso-fareast-font-family:Calibri;\nmso-bidi-font-family:Calibri;font-size:11.0000pt;\">\u00a0<\/span><tbody><tr><td style=\"width:553.8000pt;padding:0.0000pt 5.4000pt 0.0000pt 5.4000pt ;border-left:1.0000pt solid windowtext;\nmso-border-left-alt:0.5000pt solid windowtext;border-right:1.0000pt solid windowtext;mso-border-right-alt:0.5000pt solid windowtext;\nborder-top:1.0000pt solid windowtext;mso-border-top-alt:0.5000pt solid windowtext;border-bottom:1.0000pt solid windowtext;\nmso-border-bottom-alt:0.5000pt solid windowtext;\" width=\"738\" valign=\"top\"><\/td><td style=\"width:553.8000pt;padding:0.0000pt 5.4000pt 0.0000pt 5.4000pt ;border-left:1.0000pt solid windowtext;\nmso-border-left-alt:0.5000pt solid windowtext;border-right:1.0000pt solid windowtext;mso-border-right-alt:0.5000pt solid windowtext;\nborder-top:none;mso-border-top-alt:0.5000pt solid windowtext;border-bottom:1.0000pt solid windowtext;\nmso-border-bottom-alt:0.5000pt solid windowtext;\" width=\"738\" valign=\"top\"><\/td><\/tr><\/tbody><\/p><\/p>\n\n\n\n<p>Utilizing the virus total program also gives us the same hash values and it also provides a comprehensive analysis of the files after scanning for the availability of the file in multiple virus scanning engines to detect malware and other threats. Virustotal also indicates the presence of vulnerabilities in a file. This is relevant in digital forensics as malware detection is a critical aspect in digital forensics to assess the nature of the threats identified in evidence files.<\/p>\n\n\n\n<p>While doing this lab I learned how to utilize wine to run Windows applications in Ubuntu Linux where the Windows tools used such as sigcheck and hashcalc were installed using wine to compute the hash values. To calculate the hash values using the terminal, inbuilt Linux commands were used that include <strong>md5sum, sha1sum, and sha256<\/strong>&nbsp;to get the specific hash values required as shown above.<\/p>\n\n\n\n<h1 class=\"wp-block-heading\"><strong>APA References&nbsp;<\/strong><strong><\/strong><\/h1>\n\n\n\n<p><strong>Students<\/strong><\/p>\n\n\n\n<p>Khairunnisak, K., &amp; Widodo, W. (2023). Digital Forensic Tools And Techniques For Handling Digital Evidence. <em>Jurnal RESISTOR (Rekayasa Sistem Komputer)<\/em>, <em>6<\/em>(1), 1\u201311. https:\/\/doi.org\/10.31598\/jurnalresistor.v6i1.1266<\/p>\n\n\n\n<p>Mando_elnino. (2023, March 27). <em>A Brief use of Sysinternals: Sigcheck<\/em>. Medium. https:\/\/medium.com\/@mando_elnino\/explaining-and-using-sysinternals-sigcheck-f74ac4356000<\/p>\n\n\n\n<p>Masri, R., &amp; Aldwairi, M. (2017, April 1). <em>Automated malicious advertisement detection using VirusTotal, URLVoid, and TrendMicro<\/em>. IEEE Xplore. https:\/\/doi.org\/10.1109\/IACS.2017.7921994<\/p>\n\n\n\n<p>Roussev, V. (2009). Hashing and Data Fingerprinting in Digital Forensics. <em>IEEE Security &amp; Privacy Magazine<\/em>, <em>7<\/em>(2), 49\u201355. https:\/\/doi.org\/10.1109\/msp.2009.40<\/p>\n\n\n\n<p>Xenya, M. C., &amp; Quist-Aphetsi, K. (2019). A Cryptographic Technique for Authentication and Validation of Forensic Account Audit Using SHA256. <em>2019 International Conference on Cyber Security and Internet of Things (ICSIoT)<\/em>. https:\/\/doi.org\/10.1109\/icsiot47925.2019.00008<\/p>\n\n\n<p><\/div><\/p>\n","protected":false},"excerpt":{"rendered":"","protected":false},"author":1,"featured_media":0,"comment_status":"closed","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[359],"tags":[],"class_list":["post-34335","post","type-post","status-publish","format-standard","hentry","category-education"],"_links":{"self":[{"href":"https:\/\/myassignmenthelp.info\/assignments\/wp-json\/wp\/v2\/posts\/34335","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/myassignmenthelp.info\/assignments\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/myassignmenthelp.info\/assignments\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/myassignmenthelp.info\/assignments\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/myassignmenthelp.info\/assignments\/wp-json\/wp\/v2\/comments?post=34335"}],"version-history":[{"count":1,"href":"https:\/\/myassignmenthelp.info\/assignments\/wp-json\/wp\/v2\/posts\/34335\/revisions"}],"predecessor-version":[{"id":34346,"href":"https:\/\/myassignmenthelp.info\/assignments\/wp-json\/wp\/v2\/posts\/34335\/revisions\/34346"}],"wp:attachment":[{"href":"https:\/\/myassignmenthelp.info\/assignments\/wp-json\/wp\/v2\/media?parent=34335"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/myassignmenthelp.info\/assignments\/wp-json\/wp\/v2\/categories?post=34335"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/myassignmenthelp.info\/assignments\/wp-json\/wp\/v2\/tags?post=34335"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}