LAB4-coursehero
.docx
keyboard_arrow_up
School
University of Maryland Global Campus (UMGC) *
*We aren’t endorsed by this school
Course
640
Subject
Information Systems
Date
Apr 30, 2024
Type
docx
Pages
16
Uploaded by ChiefElk3276
Semester: Winter 2024
Year:2024
Section Number: CST 640
Lab 4 Worksheet Digital Forensics
Technology and Practices Table of Contents
Introduction
...............................................................................................................................................................
2
Screenshot 1 – Yourname Displayed as the Hostname
..............................................................................................
3
Screenshot 2 – Yourname file hashed with Sigcheck
.................................................................................................
4
Screenshot 3 –Yourname file hashed with HashTab
..................................................................................................
5
Screenshot 4 – Yourname file hashed with HashCalc
................................................................................................
6
Screenshot 5 – MD5 of Yourname File in /usr/share/windows-binaries
...................................................................
7
Screenshot 6– SHA1 hash of Yourname File in /usr/share/windows-binaries
...........................................................
8
Screenshot 7– SHA256 hash of Yourname File in /usr/share/windows-binaries
.......................................................
9
Screenshot 8– SHA384 hash of Yourname File in /usr/share/windows-binaries
.....................................................
10
Screenshot 9– SHA512 hash of Yourname File in /usr/share/windows-binaries
.....................................................
11
Screenshot 10 – Virustotal Statistics
........................................................................................................................
12
Conclusion
...............................................................................................................................................................
13
APA References
........................................................................................................................................................
14
1
Introduction
Students: In the box below, please explain the purpose of Hashing and explain how it is relevant to Digital Forensics Technology and Practices.
Introduction
Hashing serves as a digital fingerprinting technique crucial for preserving data integrity. It involves
applying a mathematical algorithm to produce a unique code, known as a hash, corresponding to the data.
The primary purpose is to verify the data's integrity by comparing hashes; any modification to the data, even
a single bit, will result in a different hash.
Maintaining the integrity of acquired evidence is paramount in forensic investigations. The condition
of the evidence must remain unchanged from the acquisition to the investigation's conclusion. Hashing is a
reliable method to ensure this consistency.
Upon obtaining a piece of evidence, whether it be a forensic image, memory dump, or packet
capture, it is imperative to promptly generate its hash using a selected algorithm. After processing the
evidence, the hash is recalculated using the same algorithm. If the two hash values match, it indicates the
evidence remains unaltered, and its integrity is intact.
Matching hash values provide assurance and validity to conclude the investigation. Conversely, if the
integrity of the evidence has been compromised, rendering it 'inadmissible' or invalid, the investigation's
findings may be unreliable (MOSSE Cybersecurity Institute, 2022).
Hashing is widely utilized to quickly compare the equality of two files by calculating their hash values,
2
eliminating the need for detailed word-by-word comparisons. It also plays a crucial role in verifying file
integrity after transfer, especially in backup programs like SyncBack. Users can simply compare the hash
values of the original and transferred files; a match indicates an identical copy, ensuring the file's integrity
(Chung, n.d.).
3
Screenshot 1 – Olu Displayed as the Hostname
1.
When you look at the hostname of the computer, the computer name should be Your First Name. The use of anyone else’s name may result in an academic integrity review by your professor. Please label your screenshot to receive full credit.
Take a screenshot of the Your Name as the Computer Name as the Hostname 4
Screenshot 2 – Olu file hashed with Sigcheck 2.
Take a screenshot of the hostname.txt file hashed with sigcheck. The use of anyone else’s name may
result in an academic integrity review by your professor. Also, it is mathematically possible that you and another student could have the same MD5 hash for your hostname text file. Please label your screenshot to receive full credit.
Take a screenshot of the yourname.txt file hashed with sigcheck
5
Screenshot 3 –Olu file hashed with HashTab
3.
Take a screenshot of the yourname.txt file hashed with Hashtab. The use of anyone else’s name may result in an academic integrity review by your professor. Please label your screenshot to receive full credit.
Take a screenshot of the yourname.txt file hashed with Hashtab
6
Your preview ends here
Eager to read complete document? Join bartleby learn and gain access to the full version
- Access to all documents
- Unlimited textbook solutions
- 24/7 expert homework help