C840_Cyber_Forensics_Task_2.docx C840 Task II Cyber_Forensics Background: A rogue laptop has been found on a company network and has allegedly been committing
...
C840_Cyber_Forensics_Task_2.docx C840 Task II Cyber_Forensics Background: A rogue laptop has been found on a company network and has allegedly been committing fraudulent activity over the internet. The laptop has been seized and the suspect has been detained. The Department of Justice has been tasked with executing a forensic analysis on the hard drive for any deleted or hidden evidence of internet fraud. Process: To perform the forensic analysis of the hard drive, the forensics team used two programs. The first program is AccessData FTK Imager, which was used to create an identical image of the suspects hard disk and copy the specified location of “Forensic (H:)â€. The second tool that was used is Disk Digger, a forensic analysis tool that allowed me to view all sectors of the hard drive and reveal any deleted files. The steps take to copy the hard drive and analyze the image for evidence is documented in the images below along with descriptions. Step 1: Preparing the drive where the disk would be copied to through formatting as NTFS. This ensures that there is nothing else on the drive. Step 2: I initiated AccessData FTK Imager and selected “Create Disk Image†from the File tab within the program. Logical drive was selected and the next button was pressed. Step 3: Drive G: was selected for the image source. The add button is selected. Raw(dd) data was selected as the destination type after the add button is selected. Step 4: Case info. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .. . . . . .. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .. . .. .. . . . . . . . . . . . . . . . . . .. . . . .
[Show More]