Reflection on Computer Forensics Topics-CST 640
Reflection on Computer Forensics Topics-Lab 11 Worksheet Digital Forensics Technology and Practices
Table of Contents
Introduction……………………………………………………………………………………………………………………………………………2
Screenshot 1 – Registry Tool or Autoruns……………………………………………………………………………………………………3
Screenshot 3 – Log Viewing………………………………………………………………………………………………………………………4
Screenshot 3 – Log Parsing tool…………………………………………………………………………………………………………………5
Screenshot 4 – Hashing Tool……………………………………………………………………………………………………………………..6
discuss the tool and explain the relevance to computer forensics………………………………………………………………….6
Screenshot 5 – FTK Imager………………………………………………………………………………………………………………………..7
Screenshot6 – Disk Analysis Tool (for example Autopsy)……………………………………………………………………………….8
Screenshot 7 – Browser Recovery Tool……………………………………………………………………………………………………….9
Screenshot 8 – Malware Analysis Tool………………………………………………………………………………………………………10
Screenshot 9 – Volatility Framework or Sysinternals IR Tool………………………………………………………………………..11
Screenshot 10 – Wireshark or Network Miner…………………………………………………………………………………………..12
Conclusion……………………………………………………………………………………………………………………………………………13
APA References……………………………………………………………………………………………………………………………………..14
Table of Contents
Introduction……………………………………………………………………………………………………………………………………………2
Screenshot 1 – Registry Tool or Autoruns……………………………………………………………………………………………………3
Screenshot 3 – Log Viewing………………………………………………………………………………………………………………………4
Screenshot 3 – Log Parsing tool…………………………………………………………………………………………………………………5
Screenshot 4 – Hashing Tool……………………………………………………………………………………………………………………..6
discuss the tool and explain the relevance to computer forensics………………………………………………………………….6
Screenshot 5 – FTK Imager………………………………………………………………………………………………………………………..7
Screenshot6 – Disk Analysis Tool (for example Autopsy)……………………………………………………………………………….8
Screenshot 7 – Browser Recovery Tool……………………………………………………………………………………………………….9
Screenshot 8 – Malware Analysis Tool………………………………………………………………………………………………………10
Screenshot 9 – Volatility Framework or Sysinternals IR Tool………………………………………………………………………..11
Screenshot 10 – Wireshark or Network Miner…………………………………………………………………………………………..12
Conclusion……………………………………………………………………………………………………………………………………………13
APA References……………………………………………………………………………………………………………………………………..14
Introduction
Students: In the box below, reflect on some of the Computer Forensics tools and techniques you learned about in this class.
Introduction
Students: In the box below, reflect on some of the Computer Forensics tools and techniques you learned about in this class.
Introduction
Screenshot 1 – Registry Tool or Autoruns
1. Post a Screenshot of any Windows Registry tool or Autoruns from any of your Prior labs. In 3-5 complete sentences (below your screenshot), discuss the tool and explain the relevance to computer forensics.
1. Post a Screenshot of any Windows Registry tool or Autoruns from any of your Prior labs. In 3-5 complete sentences (below your screenshot), discuss the tool and explain the relevance to computer forensics.
Screenshot 3 – Log Viewing
2. Post a Screenshot of any Log Viewing Utility, (Event Viewer, Notepad++) from any of your Prior labs. In 3-5 complete sentences (below your screenshot), discuss the tool and explain the relevance to computer forensics.
2. Post a Screenshot of any Log Viewing Utility, (Event Viewer, Notepad++) from any of your Prior labs. In 3-5 complete sentences (below your screenshot), discuss the tool and explain the relevance to computer forensics.
Screenshot 3 – Log Parsing tool
3. Post a Screenshot of a Log Viewer or commands useful for Log parsing from any of your Prior labs. In 3-5 complete sentences (below your screenshot), discuss the tool and explain the relevance to computer forensics.
3. Post a Screenshot of a Log Viewer or commands useful for Log parsing from any of your Prior labs. In 3-5 complete sentences (below your screenshot), discuss the tool and explain the relevance to computer forensics.
Screenshot 4 – Hashing Tool
4. Post a Screenshot of Hashing Tool (hashtab, sigcheck, etc) from any of your Prior labs. In 3-5 complete sentences (below your screenshot),
discuss the tool and explain the relevance to computer forensics
4. Post a Screenshot of Hashing Tool (hashtab, sigcheck, etc) from any of your Prior labs. In 3-5 complete sentences (below your screenshot),
discuss the tool and explain the relevance to computer forensics
Screenshot 5 – FTK Imager
5. Post a Screenshot of FTK Imager from any of your Prior labs.
In 3-5 complete sentences (below your screenshot),
discuss the tool and explain the relevance to computer forensics.
5. Post a Screenshot of FTK Imager from any of your Prior labs.
In 3-5 complete sentences (below your screenshot),
discuss the tool and explain the relevance to computer forensics.
Screenshot6 – Disk Analysis Tool (for example Autopsy)
6. Post a Screenshot of any Disk Analysis tool (like Autopsy) from any of your Prior labs. In 3-5 complete sentences (below your screenshot),
discuss the tool and explain the relevance to computer forensics.
6. Post a Screenshot of any Disk Analysis tool (like Autopsy) from any of your Prior labs. In 3-5 complete sentences (below your screenshot),
discuss the tool and explain the relevance to computer forensics.
Screenshot 7 – Browser Recovery Tool
7. Post a Screenshot of any Browser Recovery Tool from any of your Prior labs.
In 3-5 complete sentences (below your screenshot),
discuss the tool and explain the relevance to computer forensics.
7. Post a Screenshot of any Browser Recovery Tool from any of your Prior labs.
In 3-5 complete sentences (below your screenshot),
discuss the tool and explain the relevance to computer forensics.
Screenshot 8 – Malware Analysis Tool
8. Post a Screenshot of using a Malware Analysis tool the file command or the virustotal website In 3-5 complete sentences (below your screenshot), discuss the tool and explain the relevance to computer forensics.
8. Post a Screenshot of using a Malware Analysis tool the file command or the virustotal website In 3-5 complete sentences (below your screenshot), discuss the tool and explain the relevance to computer forensics.
Screenshot 9 – Volatility Framework or Sysinternals IR Tool
9. Post a Screenshot of using the Volatility Framework or Sysinternals IR Tool from any of your Prior labs. In 3-5 complete sentences (below your screenshot), discuss the tool and explain the relevance to computer forensics.
9. Post a Screenshot of using the Volatility Framework or Sysinternals IR Tool from any of your Prior labs. In 3-5 complete sentences (below your screenshot), discuss the tool and explain the relevance to computer forensics.
Screenshot 10 – Wireshark or Network Miner
10. Post a Screenshot of Wireshark or Network Miner. In 3-5 complete sentences, discuss the tool and explain the relevance to computer forensics. In 3-5 complete sentences (below your screenshot),
discuss the tool and explain the relevance to computer forensics.
10. Post a Screenshot of Wireshark or Network Miner. In 3-5 complete sentences, discuss the tool and explain the relevance to computer forensics. In 3-5 complete sentences (below your screenshot),
discuss the tool and explain the relevance to computer forensics.
Conclusion
Students: In the box below, please give some feedback on the course. Discuss what you like and what you think could be improved. Discuss your new perspective on Computer
forensics.
Conclusion
APA References
Students: Please list at least 5 relevant APA References.
Students: In the box below, please give some feedback on the course. Discuss what you like and what you think could be improved. Discuss your new perspective on Computer
forensics.
Conclusion
APA References
Students: Please list at least 5 relevant APA References.
Answer Preview-Reflection on Computer Forensics Topics-CST 640
$15.00