LAB4-coursehero

.docx

School

University of Maryland Global Campus (UMGC) *

*We aren’t endorsed by this school

Course

640

Subject

Information Systems

Date

Apr 30, 2024

Type

docx

Pages

16

Uploaded by ChiefElk3276

Report
Semester: Winter 2024 Year:2024 Section Number: CST 640 Lab 4 Worksheet Digital Forensics Technology and Practices Table of Contents Introduction ............................................................................................................................................................... 2 Screenshot 1 – Yourname Displayed as the Hostname .............................................................................................. 3 Screenshot 2 – Yourname file hashed with Sigcheck ................................................................................................. 4 Screenshot 3 –Yourname file hashed with HashTab .................................................................................................. 5 Screenshot 4 – Yourname file hashed with HashCalc ................................................................................................ 6 Screenshot 5 – MD5 of Yourname File in /usr/share/windows-binaries ................................................................... 7 Screenshot 6– SHA1 hash of Yourname File in /usr/share/windows-binaries ........................................................... 8 Screenshot 7– SHA256 hash of Yourname File in /usr/share/windows-binaries ....................................................... 9 Screenshot 8– SHA384 hash of Yourname File in /usr/share/windows-binaries ..................................................... 10 Screenshot 9– SHA512 hash of Yourname File in /usr/share/windows-binaries ..................................................... 11 Screenshot 10 – Virustotal Statistics ........................................................................................................................ 12 Conclusion ............................................................................................................................................................... 13 APA References ........................................................................................................................................................ 14 1
Introduction Students: In the box below, please explain the purpose of Hashing and explain how it is relevant to Digital Forensics Technology and Practices. Introduction Hashing serves as a digital fingerprinting technique crucial for preserving data integrity. It involves applying a mathematical algorithm to produce a unique code, known as a hash, corresponding to the data. The primary purpose is to verify the data's integrity by comparing hashes; any modification to the data, even a single bit, will result in a different hash. Maintaining the integrity of acquired evidence is paramount in forensic investigations. The condition of the evidence must remain unchanged from the acquisition to the investigation's conclusion. Hashing is a reliable method to ensure this consistency. Upon obtaining a piece of evidence, whether it be a forensic image, memory dump, or packet capture, it is imperative to promptly generate its hash using a selected algorithm. After processing the evidence, the hash is recalculated using the same algorithm. If the two hash values match, it indicates the evidence remains unaltered, and its integrity is intact. Matching hash values provide assurance and validity to conclude the investigation. Conversely, if the integrity of the evidence has been compromised, rendering it 'inadmissible' or invalid, the investigation's findings may be unreliable (MOSSE Cybersecurity Institute, 2022). Hashing is widely utilized to quickly compare the equality of two files by calculating their hash values, 2
eliminating the need for detailed word-by-word comparisons. It also plays a crucial role in verifying file integrity after transfer, especially in backup programs like SyncBack. Users can simply compare the hash values of the original and transferred files; a match indicates an identical copy, ensuring the file's integrity (Chung, n.d.). 3
Screenshot 1 – Olu Displayed as the Hostname 1. When you look at the hostname of the computer, the computer name should be Your First Name. The use of anyone else’s name may result in an academic integrity review by your professor. Please label your screenshot to receive full credit. Take a screenshot of the Your Name as the Computer Name as the Hostname 4
Screenshot 2 – Olu file hashed with Sigcheck 2. Take a screenshot of the hostname.txt file hashed with sigcheck. The use of anyone else’s name may result in an academic integrity review by your professor. Also, it is mathematically possible that you and another student could have the same MD5 hash for your hostname text file. Please label your screenshot to receive full credit. Take a screenshot of the yourname.txt file hashed with sigcheck 5
Screenshot 3 –Olu file hashed with HashTab 3. Take a screenshot of the yourname.txt file hashed with Hashtab. The use of anyone else’s name may result in an academic integrity review by your professor. Please label your screenshot to receive full credit. Take a screenshot of the yourname.txt file hashed with Hashtab 6
Your preview ends here
Eager to read complete document? Join bartleby learn and gain access to the full version
  • Access to all documents
  • Unlimited textbook solutions
  • 24/7 expert homework help