Digital Forensics Experiment - 2: Generation and Validation of Forensic Report Utilizing Data Set
Digital Forensics Experiment - 2: Generation and Validation of Forensic Report Utilizing Data Set
EXPERIMENT - 2
For OS:
Account name Last login
Wes Mantooth 2008-02-13 02:16:39 IST
The dates have been found on the basis of their email history:
5) If there is any evidence of .exe file being deleted, describe the artifact
name and document your findings
Ans) File named $RTHDU55.exe deleted on 2007-06-24 05:53:41 IST
Deleted file titled cocaine. Couldn’t access this file as deleted file.
Crack
Hawaiian-ruler
SudaFed
Unknown Drug (Not marked anywhere)
Some Chemicals
Un-named Drugs/Chemicals
Vape
Seconal , Nembutal and Tuinal
Amphetamine
Meth
Unknown Drugs
10) Find the list of criminal activities Mantooth was involved in and the
associated artifacts.
Ans) Criminal Activities Mantooth was involved in were:
a. Drug Dealing
Photos in previous question’s solution.
A mail with make meth as subject:
d. Check Stealing
12) Mantooth received one Text Internet Email that had no subject about
a stolen ATM. Who sent it to him (name and email) and when was it
sent?
Ans) Mantooth didn’t receive any email with information about a stolen
ATM. However he had photos of ATMs stored in his Temporary Internet
Files that means that he himself browsed this in his internet history.
His browsing history proves so as:
13) Find when and who deleted the file ValidCreditCard.jar?
Ans) There is no file found named ValidCreditCard.jar
PART 2 :
1) What is the starting sector of Partition 2 and what is the size of it?
Ans)