Title: CCSI 460 Experience Tradition/newtonhelp.com
1CCSI 460 Experience Tradition/newtonhelp.com
2CCSI 460 Experience Tradition/newtonhelp.com
- CCSI 460 Week 1 Homework
-
- For more course tutorials visit
- www.newtonhelp.com
-
- Analyze the wireshark packet capture file called
week1.pcap in doc sharing. view the packet and
produce a short report including the following -
- date and time of transactions
- protocol used to communicate with the server
- All IPs utilized
- Mac Address of PC Communicating with the server
3CCSI 460 Experience Tradition/newtonhelp.com
- CCSI 460 Week 1 Lab Survey of Forensic Toolkits
-
- For more course tutorials visit
- www.newtonhelp.com
-
- CCSI 460 Week 1 Lab Survey of Forensic Toolkits
4CCSI 460 Experience Tradition/newtonhelp.com
- CCSI 460 Week 2 Current Issues in Digital
Forensics -
- For more course tutorials visit
- www.newtonhelp.com
-
- CCSI 460 Week 2 Current Issues in Digital
Forensics
5CCSI 460 Experience Tradition/newtonhelp.com
- CCSI 460 Week 2 Homework
-
- For more course tutorials visit
- www.newtonhelp.com
-
- CCSI 460 Week 2 Homework
6CCSI 460 Experience Tradition/newtonhelp.com
- CCSI 460 Week 2 MD5SUM Hash Value Image Report
-
- For more course tutorials visit
- www.newtonhelp.com
-
- CCSI 460 Week 2 MD5SUM Hash Value Image Report
7CCSI 460 Experience Tradition/newtonhelp.com
- CCSI 460 Week 3 Homework
-
- For more course tutorials visit
- www.newtonhelp.com
-
- Week 3 homework
-
- Download the picture Doc Sharing called
hidden.jpg. - Use md5um to get the hash value of the file and
size. - Download the program steghide.zip from Doc
Sharing. - You will use this program to hide another picture
inside the hidden.jpg image (its a command line
program so you will need some time working with
it). - Take a picture of yourself or use a phone that
you already have. You will need to embed the
photo inside the hidden.jpg fls using steghide.
8CCSI 460 Experience Tradition/newtonhelp.com
- CCSI 460 Week 3 Lab Report Internet Research
-
- For more course tutorials visit
- www.newtonhelp.com
-
- CCSI 460 Week 3 Lab Report Internet Research
9CCSI 460 Experience Tradition/newtonhelp.com
- CCSI 460 Week 4 Homework
-
- For more course tutorials visit
- www.newtonhelp.com
-
- Analyze the Wireshark packet capture fils
called ftp.pcap in Doc Sharing.View the packets
and produce a short report including the
following. - Date and time of transactions
- Protocol used communicate with server
- All IPS utilized
- Usename of connection
- Password of connection
10CCSI 460 Experience Tradition/newtonhelp.com
- CCSI 460 Week 4 Lab Report Hard Drive Image
Analysis -
- For more course tutorials visit
- www.newtonhelp.com
-
- Lab Number and Title Lab4 Hard Drive Image
Analysis - Summary of Findings
- The source code was exposed by means of criminal
activity that Denny Vette was involved in through
1/2/02. There were many items found through the
analysis of the hard drive that indicate hacking,
steganographic, and cryptographic activities. - Main evidence recovered was a deleted item from
the sent folder of Microsoft Outlook Express.
This sent email included an attachment which is
suspected of being a steganographic image (a file
hidden within a .jpg photo file). Denny Vette
sent the e-mail tomrbig_at_second.source.ru and the
body of the e-mail stated Big, heres the
picture that I promised you. As agreed, youll
pay me 100k now and the
11CCSI 460 Experience Tradition/newtonhelp.com
- CCSI 460 Week 5 Homework
-
- For more course tutorials visit
- www.newtonhelp.com
-
- Stalk yourself or a family member. Pretend that
you a cyber stalker and you are going to stalk
yourself. - Provide a summary on the information that you
found about yourself. Are there things you found
that surprised you? Do you feel you have control
over your information on the internet? Please do
not provide the specific information you found
concerning yourself, only provide a summary of
your thought concerning it. - Tip Try searching your address, phone number,
Facebook page, Twitter account, and even maiden
name, etc. Think uot-of-the-box for this one. You
should try a variety of internet resources.
12CCSI 460 Experience Tradition/newtonhelp.com
- CCSI 460 Week 5 Lab Report Bid ridding and Cyber
Stalking -
- For more course tutorials visit
- www.newtonhelp.com
-
- CCSI 460 Week 5 Lab Report Bid ridding and
Cyber-Stalking
13CCSI 460 Experience Tradition/newtonhelp.com
- CCSI 460 Week 6 Homework
-
- For more course tutorials visit
- www.newtonhelp.com
-
- Week 6 homework
-
- Mobile Phone Photo Analysis
- Your client has been accused of a crime. You have
take the clients phone and acquired the image
called client.jpg. The hash for the files is - 059B138917504F80599E556F3017B246.
- The client says that this photo will help to
clear him or her of the investigation. You need
to determine the date, time, and locations of the
photo. Look for the actual location (not the GPS
coordinates,
14CCSI 460 Experience Tradition/newtonhelp.com
- CCSI 460 Week 7 Course Project Forensic System
Image Investigation -
- For more course tutorials visit
- www.newtonhelp.com
-
- CCSI 460 Week 7 Course Project Forensic System
Image Investigation
15CCSI 460 Experience Tradition/newtonhelp.com
- CCSI 460 Week 7 Homework Honeypot Research
-
- For more course tutorials visit
- www.newtonhelp.com
-
- Research two different honeypots that are
available to use free or open source. List the
sites and honeypots that you selected. - Discuss the benefits of utilizing a virtual
machine for the implementation of the honeypots
that you selected (one paragraph). - What resources would you need to be able to set
up and utilize a honeypot for the https//devryu.i
nstructure.com domain (two paragraphs)? -
16CCSI 460 Experience Tradition/newtonhelp.com