Computer Forensics Exercises

/Computer Forensics Exercises

Windows Forensics

Computer forensics is a broad concept that refers mainly to crimes committed with the use of computers. Various laws have been passed against cybercrime, but it still exists and the guilty parties are difficult to find due to the lack of physical evidence. This challenge can be overcome with the help of computer forensics. [...]

August 14th, 2014|Categories: Computer Forensics Exercises, Windows Forensics|Comments Off on Windows Forensics

Investigative Reports

An investigative report is a forensics report that defines the details of an incident, contains all information required to explain the conclusion, and holds legal inspection. It is used to communicate the results of the forensic investigation. Create an investigation report Add appropriate recommendations Add a concise summary of conclusions [...]

August 7th, 2014|Categories: Computer Forensics Exercises, Investigative Reports|Comments Off on Investigative Reports

Tracking Emails and Investigating Email Crimes

Investigating email crimes is the process of tracing, collecting, analyzing, and investigating digital evidence and cyber trails. Digital evidence and cyber trails can relate to email spamming, mail bombing/mail storms, email spoofing, identity fraud/chain letters, phishing attacks, and email hijacking. Recovering deleted email messages and attachments Recovering message contacts Tracking sender [...]

August 7th, 2014|Categories: Computer Forensics Exercises, Tracking Emails and Investigating Email Crimes|Comments Off on Tracking Emails and Investigating Email Crimes

Investigating Wireless Attacks

A wireless network refers to any type of computer network that is wireless and is commonly associated with a telecommunications network whose interconnections between nodes are implemented without the use of wires. Wireless telecommunications networks are generally implemented with some type of remote information transmission system that uses electromagnetic waves such as radio waves for [...]

August 7th, 2014|Categories: Computer Forensics Exercises, Investigating Wireless Attacks|Comments Off on Investigating Wireless Attacks

Network Forensics, Investigating Logs and Investigating Network Traffic

Network forensics is the process of identifying criminal activity and the people behind the crime. Network forensics can be defined as sniffing, recording, acquisition, and analysis of the network traffic and event logs in order to investigate a network security incident. It allows investigator to inspect network traffic and logs to identify and locate the [...]

August 7th, 2014|Categories: Computer Forensics Exercises, Investigating Logs and Investigating Network Traffic|Comments Off on Network Forensics, Investigating Logs and Investigating Network Traffic

Log Capturing and Event Correlation

Every device on a network generates some kind of log for each and every action carried out on the network. Capturing and analyzing the log files are important steps for investigating the security posture of the target network, as they contain information about all the system, device, and user activities that took place within the [...]

August 7th, 2014|Categories: Computer Forensics Exercises, Log Capturing and Event Correlation|Comments Off on Log Capturing and Event Correlation

Application Password Crackers

Password-protected files might be a hurdle in the investigation process, as forensic investigators need to crack the passwords to gain access to the locked files. Password crackers use two primary methods to identify correct passwords: brute-force and dictionary searches. When a password cracker uses brute-force, it runs through combinations of characters within a predetermined length [...]

August 7th, 2014|Categories: Application Password Crackers, Computer Forensics Exercises|Comments Off on Application Password Crackers

Steganography and Image File Forensics

The goal of steganography and image file forensics is to find images with steganographic content and detect hidden content within digital images (image files) in a forensically sound manner. Investigators need to be familiar with the name of the common steganographic software and related terminology, and with websites about steganography. Using [...]

August 7th, 2014|Categories: Computer Forensics Exercises, Steganography and Image File Forensics|Comments Off on Steganography and Image File Forensics

Forensics Investigation Using EnCase

EnCase® Forensic solution lets examiners acquire data from a wide variety of devices, unearth potential evidence with disk level forensic analysis, and craft comprehensive reports on their findings, all while maintaining the integrity of their evidence. Forensics Investigation Using EnCase Computer Forensics Exercises / Forensics [...]

August 7th, 2014|Categories: Computer Forensics Exercises|Comments Off on Forensics Investigation Using EnCase

Forensics Investigation Using AccessData FTK

Forensics investigation involves the acquisition, preservation, analysis, and presentation of computer evidence. This type of evidence is fragile in nature and can easily, (or even inadvertently), be altered, destroyed, or rendered inadmissible as evidence. Computer evidence must be properly obtained, preserved, and analyzed to be accepted as reliable and valid in a court of law. [...]

August 7th, 2014|Categories: Computer Forensics Exercises, Forensics Investigation Using AccessData FTK|Comments Off on Forensics Investigation Using AccessData FTK