LentzS_CST640_Week8Lab
.docx
keyboard_arrow_up
School
University of Maryland, University College *
*We aren’t endorsed by this school
Course
640
Subject
Information Systems
Date
Feb 20, 2024
Type
docx
Pages
14
Uploaded by SuperHumanBook10401
Name: Sheila Lentz
Semester: Fall
Year: 2023
Section Number: 9040
Lab 8 Worksheet Digital Forensics
Technology and Practices
Table of Contents
Introduction
...............................................................................................................................................................
2
Screenshot 1 – Creation of Yourname.TXT file
...........................................................................................................
3
Screenshot 2 – Finding the File Type of the Yourname.TXT file
.................................................................................
4
Screenshot 3 – Finding the File Type of the Yourname file
........................................................................................
5
Screenshot 4 – Creation of Yourname.exe file
...........................................................................................................
6
Screenshot 5 – Get the Hash of the Yourname.exe File
.............................................................................................
7
Screenshot 6 – Identify the File Type of Yourname.exe
.............................................................................................
8
Screenshot 7 – Getting the strings of the Yourname.exe File
....................................................................................
9
Screenshot 8 – Creating Yourname.exe Malware
....................................................................................................
10
Screenshot 9– Finding the File Type of the Yourname file with .Doc Extension
......................................................
11
Screenshot 10– Use Virustotal to Analyze Yourname file with .Doc Extension
........................................................
12
Conclusion
...............................................................................................................................................................
13
APA References
........................................................................................................................................................
14
1
Introduction
Students: In the box below, please explain the purpose of doing this lab below and explain how it is relevant to Computer Forensics.
Introduction
In the realm of computer forensics and cybersecurity, the `ls -la` command in Linux is indispensable. It provides a comprehensive listing of all files within a directory, crucial for revealing potential indicators of compromise or unauthorized activity (Kamathe, 2020). This command is particularly potent when inspecting directories like “/usr/share/windows-binaries”, where executables such as “whoami.exe” and “nc.exe” reside (Zivanov, 2023). These files can be telling; their permissions and ownership may point to unauthorized system
access (Linuxize, 2020).
The `whoami.exe` utility, pivotal in ascertaining the identity of the user operating a system, becomes an essential piece in the puzzle of tracing actions back to their source (Zivanov, 2023). Similarly, “nc.exe”, better
known as Netcat, is a multifaceted tool used by administrators and attackers alike for network diagnostics and potentially as a vector for illicit access (V, 2023). The adept use of Netcat in network testing and data transfer can either uphold security or betray its breach, thereby forming a crucial element of forensic investigations (Buckbee, 2022).
Understanding the output of `ls -la` transcends mere file listing; it's about dissecting the system's integrity at any moment, where each executable's history may contribute to unraveling a cyber event's narrative (Kamathe, 2020). Mastery of interpreting these details is a critical skill for any cybersecurity professional or forensic analyst, serving as the foundation for incident analysis and response.
2
Screenshot 1 – Creation of Yourname.TXT file
1.
Create a file at the terminal that says hello world and send the output of the file to yourname.txt, where yourname is your first name. Take a screenshot of sending hello world to your file. The use of
anyone else’s name may result in an academic integrity review by your professor. Please label your screenshot to receive full credit.
Take a screenshot of the Your Name Text File being Created 3
Screenshot 2 – Finding the File Type of the Yourname.TXT file
2.
Use the file command in Linux to identify the file type of the yourname.txt file, where yourname is your first name. The use of anyone else’s name may result in an academic integrity review by your professor. Please label your screenshot to receive full credit.
Take a screenshot of using the File Command on the Your Name Text File 4
Screenshot 3 – Finding the File Type of the Yourname file (no Extension) 3.
Use the file command in Linux to identify the file type of the yourname file, where yourname is your
first name. The use of anyone else’s name may result in an academic integrity review by your professor. Please label your screenshot to receive full credit.
Take a screenshot of using the File Command on the Your Name Text File 5
Your preview ends here
Eager to read complete document? Join bartleby learn and gain access to the full version
- Access to all documents
- Unlimited textbook solutions
- 24/7 expert homework help