Assignment Hints and Questions
- ad1, ad2, (ad3) are drive image purporting to be of the same computer.
Install the AccessData FTK Imager to access the AD file format.
Note there are five ADX files but only two images which is because the images have been
split into 1.5GB sections (the last one being a remainder)
Therefore ad1+ad2+...+adX make up the full image (together). Note: So if one is missing or
co
upt you will get e
ors!
1. In the AccessData FTK Imager you need to use the Add Evidence Item... option
2. Choose Image File option
3. Browse to where you have downloaded the image files
Note: You can actually choose any of the adx files but it is less confusing if you choose the
first one as the labels reflect the starting image.
4. Finish to load the image into the Evidence tree
sfletche
Highlight
sfletche
Highlight
If you want to do a comparison between the content of the two images you can use the
Export Directory Listing... option.
This is available by right-clicking on from the image file root icon and selecting the Export
Directory Listing... option
You can open the dir listings in Excel and compare manually. Or perhaps to make it easier
you can try to use a free tool like WinMerge to compare the CSV files to help find
differences. Refer to http:
winmerge.org/?lang=en
http:
winmerge.org/?lang=en
Note the supposed image capture dates of these two additional images seem to be 2009-
Nov-19, and 2009-Dec-01. And the original image was 2009-Dec-02.
Note: It is possible these two additional images co
elate with the Volume Shadow copy
Service (VSS) images with the difference images stored in the hidden System Volume
Information folder. refer to https:
docs.microsoft.com/en-
us/windows/desktop/vss/volume-shadow-copy-service-overview
Hint: The 19 November Date co
elates with the RP19 and RP20 folders.
These dates should somehow be co
oborated by the actual evidence in the image
files. Think about what files are always updated/accessed (registry)?
Your report should highlight the following areas (these will be
assessed):
- A) Discuss if there is any evidence of illegal drug activity (Methamphetamine). Explain your
position on this. What evidence did you find if any? How sound / reliable do you believe
your evidence collection to be? [20 marks]
- B) Present any evidence in a time line format, signposting the points where you believe any
offence may have occu
ed and other significant dates/times in the case. Compare any
evidence found and timeline information side by side with the different tools available to
you (e.g. ProDiscove
OSFOrensics/ FTK Imager) and highlight any differences. Be sure to
state the pros and cons of using one tool over the other. [20 marks]
- C) You were provided with two sets of hard drive images. Are there any differences
etween them, considering they are purported to be of the same computers. What do you
think has occu
ed here? What are the differences between the sets of the drive images?
Which images do you think are the originals and why? How do you think the sets of drive
images were created? [20 marks]
- D) A common defence is that the actions were committed unintentionally or that the
perpetrator did not know the actions were illegal. With these possible defences in mind,
address how you would respond to these defences. Are there any clues that indicate intent
or knowledge of criminal activity? [20 marks]
- E) Conduct some research into ways that image files (graphic images) could be “tampered
with”. Are there ways that are undetectable, or difficult to detect? Present your findings in a
short section – written in a formal referenced style. You are only expected to have
approximately 5 references (good quality: reputable journal or conference papers). [20
marks]
https:
docs.microsoft.com/en-us/windows/desktop/vss/volume-shadow-copy-service-overview
https:
docs.microsoft.com/en-us/windows/desktop/vss/volume-shadow-copy-service-overview
Assignment Hints and Additional Questions
Additional Questions
Assignment Information
You must submit your assignment online using the Assignment course tool.
You must submit your assignment as ONE word-processed document containing all of the
equired question answers per group.
You must keep a copy of the final version of your assignment as submitted and be prepared to
provide it on request.
The University treats plagiarism, collusion, theft of other students’ work and other forms of
dishonesty in assessment seriously. For guidelines on honesty in assessment including avoiding
plagiarism, see: http:
www.murdoch.edu.au/teach/plagiarism
ICT378/ICT600 S1 2021
Cyber Forensics and Information Technology/Incident Response
M57 Patents
Assume that you’re a Forensic Investigator given the following case
Founded by Pat McGoo, m57.biz is a new patent search company that researches patent information for
their clients. Specifically, the business of patent search is to generally verify the novelty of a patent
(before the patent is granted), or to invalidate an existing patent by finding prior art (proof that the idea
existed before the patent). At the start of the scenario, the firm has four employees: CEO (Pat McGoo),
IT Administrator (Te
y), and two patent researchers (Jo, Charlie). The firm is planning to hire
additional employees at a later date once further clients are booked. Since the company is looking to
hire additional employees, they have an abundant amount of technology in the inventory that is not
eing used.
Employees work onsite and conduct most business exchanges over email. All employees work in
Windows environments, although each employee prefers different software (e.g. Outlook vs.
Thunde
ird).
ICT378/ICT600 Cyber Forensics Assignment – V1- Last Updated Fe
uary 2021
http:
www.murdoch.edu.au/teach/plagiarism
ICT378/ICT600 Cyber Forensics Assignment – V1- Last Updated Fe
uary 2021
Description - Case: Illegal Materials (Methamphetamine)
A functioning workstation originally belonging to m57.biz was purchased on the second-hand market
in early December, 2009. The buyer (Mr. Aaron Greene) realizes that the previous owner of the
computer had not erased the drive, and finds suspicious documents and videos related to drug use
(specifically Methamphetamine) when looking through the folders and opening the various
applications. Mr. Greene reports this to the police, who take possession of the computer.
Police forensics investigators determine the following:
• The computer originally belonged to m57.biz
• The computer was used in 2009 by Jo, an M57 employee, as a work machine.
• The computer was sold as-is to Mr. Aaron Greene on the 1st of December.
The police provide you with a disk image from the computer purchased by Mr. Aaron Greene, as
created on December 2nd, 2009. The image has the extension “dd”. It has been shared with you that
Mr. Aaron is considered to have acted suspiciously and answered questions inconsistently throughout
all interactions with the detectives.
ICT378/ICT600 Cyber Forensics Assignment – V1- Last Updated Fe
uary 2021
Materials – Drive Image
The materials you will use for your investigations are:
Assignment Data Files , Uploaded on the LMS
Deliverable – Report
Task Description:
You should follow forensics procedures, such as taking a hash of the image before using it and
checking regularly to ensure you have not modified it. You can select and use any proprietary or open
source tools that you have been introduced to or find yourselves to perform the analysis and extract any
evidence present.
Your report should detail the investigation process and the findings (including copies of relevant
evidence), including obstacles and problems that you encountered and how you overcame them. You
can assume that the reader has a light understanding of digital forensics, so any complicated
terms/techniques/etc should be explained.
You must include some screenshots in your reports with the output of the tools or the processes and
when necessary to support/show how you reached your conclusions. Screenshots should not be used to
excess – they merely serve to demonstrate your understanding of the tools/processes and should be
used to support written explanations (not in place of).
You will be marked based on the evidence you extract, the use of appropriate tools, the detail of the
process, the explanation on its relevance to the case and documentation.
Remember, your report should present the information in an unbiased way. Improper
handling/validation of evidence would result in loss of marks except where accurately identified and
co
ected.
**This assignment needs to be accomplished as a group of two or three members.
Marking Criteria:
The following table summarizes the marking criteria of the final report.
Sections Marks
Cover Page, Table of Contents, Executive summary 10%
Methodology 10%
Findings (use of appropriate tools and details of the process)
• Discussions (the explanation on findings’ relevance to the case)
• Supporting Evidence (accurate data acquisition)
60%
Summary & Appendix 10%
References & Formatting 10%
Total 100%
ICT378/ICT600 Cyber Forensics Assignment – V1- Last Updated Fe
uary 2021
Sample Structure for Report
Outline: Use the following as a starting-point to structure your report
Cover Page
• Title
• Date
• Student Name / Student Numbe
Table of Contents
• Main contents listed with page numbe
• Be sure to include visible page numbers on all pages
Executive summary
• Brief Description of the event
• Brief methodology of the investigation
• Brief evidence collection and preservation methods
• Conclusion with short, generalized reasons (like bullet-points)
Methodology details
• Investigation
• Evidence collection and preservation
Finding 1 - Description
• Discussion (e.g. Inculpatory or Exculpatory)
• Supporting evidence
Finding n - Description
• Discussion (e.g. Inculpatory or Exculpatory)
• Supporting evidence
Summary and Conclusion
• Discuss if there is there any evidence of illegal drug activity (Methamphetamine).
• How sound / reliable do you believe your evidence collection to be?
• Is the person innocent or guilty? Explain your position on thi.
Appendix
• Description of persons of interest (often shown in table format)
ICT378/ICT600 Cyber Forensics Assignment – V1- Last Updated Fe
uary 2021
• Association Diagram of persons of interest
• Evidence listing
• Evidence Timeline (present any evidence in a time line format, signposting the points
where you believe any offence may have occu
ed and other significant dates/times in the
case).
• Software and tools used in the investigation
• Other important listings and information as needed
References:
Your report should be your own and you should use appropriate citation and referencing formats.
All sources that you use as supporting material to your reports must be referenced according to
convention. Failure to do so will result in loss of marks! You should use the APA as a referencing
style.
Formatting:
1. Paragraph text: Font size 12 with Cali
i or Times New Roman font. 1.5 line
spacing. Justify alignment