Experiment-1: What Is The Image Hash? Does The Acquisition and Verification Hash Match?
Experiment-1: What Is The Image Hash? Does The Acquisition and Verification Hash Match?
Sap ID : 500075822
Roll No. : 09
-------------------------------------------------------------------
1. What is the image hash? Does the acquisition and verification hash match?
Hash is : aee4fcd9301c03b3b054623ca261959a
Acquisition hash is not given so it is not possible to compare both of them
10. What is the account name of the user who mostly uses the computer?
Mr. Evil is the most used account name
14. This same file reports the IP address and MAC address of the computer. What are they?
File contains both IP and MAC Address :
%LANIP% : 192.168.1.111
%LANNIC% : 0010a4933e09
15. An internet search for vendor name/model of NIC cards by MAC address can be used to
find out which network interface was used. In the above answer, the first 3 hex characters
of the MAC address report the vendor of the card. Which NIC card was used during the
installation and set-up for LOOK@LAN?
Network interface card(NIC) is used while installation with the MAC : 0010a4933e09 is
Xircom Cardbus Ethernet 100 + Modem 56
16. Find 6 installed programs that may be used for hacking.
1. Anonymizer
2. Ethereal
3. Cain and Abel
4. 123WASP
5. NetStumbler
6. Look@LAN
23. Ethereal, a popular “sniffing” program that can be used to intercept wired and wireless
internet packets was also found to be installed. When TCP packets are collected and re-
assembled, the default save directory is that user’s \My Documents directory. What is the
name of the file that contains the intercepted data?
In the Ethearal directory, there was a ‘recent’ file, this file contains “interception”
24. Viewing the file in a text format reveals much information about who and what was
intercepted. What type of wireless computer was the victim (person who had his internet
surfing recorded) using?
The file with interception in it found typed in the search bar on the top right
27. Yahoo mail, a popular web based email service, saves copies of the email under what file
name?
Yahoo Emails are stored under : ShowLetter[1]
From here we can confirm the email address used by Mr. Evil
A zip bomb is a zip malicious archive file design to crash the useless programs or system.
Used to disable antivirus programs