LentzS_CST640_Week8Lab

.docx

School

University of Maryland, University College *

*We aren’t endorsed by this school

Course

640

Subject

Information Systems

Date

Feb 20, 2024

Type

docx

Pages

14

Uploaded by SuperHumanBook10401

Report
Name: Sheila Lentz Semester: Fall Year: 2023 Section Number: 9040 Lab 8 Worksheet Digital Forensics Technology and Practices Table of Contents Introduction ............................................................................................................................................................... 2 Screenshot 1 – Creation of Yourname.TXT file ........................................................................................................... 3 Screenshot 2 – Finding the File Type of the Yourname.TXT file ................................................................................. 4 Screenshot 3 – Finding the File Type of the Yourname file ........................................................................................ 5 Screenshot 4 – Creation of Yourname.exe file ........................................................................................................... 6 Screenshot 5 – Get the Hash of the Yourname.exe File ............................................................................................. 7 Screenshot 6 – Identify the File Type of Yourname.exe ............................................................................................. 8 Screenshot 7 – Getting the strings of the Yourname.exe File .................................................................................... 9 Screenshot 8 – Creating Yourname.exe Malware .................................................................................................... 10 Screenshot 9– Finding the File Type of the Yourname file with .Doc Extension ...................................................... 11 Screenshot 10– Use Virustotal to Analyze Yourname file with .Doc Extension ........................................................ 12 Conclusion ............................................................................................................................................................... 13 APA References ........................................................................................................................................................ 14 1
Introduction Students: In the box below, please explain the purpose of doing this lab below and explain how it is relevant to Computer Forensics. Introduction In the realm of computer forensics and cybersecurity, the `ls -la` command in Linux is indispensable. It provides a comprehensive listing of all files within a directory, crucial for revealing potential indicators of compromise or unauthorized activity (Kamathe, 2020). This command is particularly potent when inspecting directories like “/usr/share/windows-binaries”, where executables such as “whoami.exe” and “nc.exe” reside (Zivanov, 2023). These files can be telling; their permissions and ownership may point to unauthorized system access (Linuxize, 2020). The `whoami.exe` utility, pivotal in ascertaining the identity of the user operating a system, becomes an essential piece in the puzzle of tracing actions back to their source (Zivanov, 2023). Similarly, “nc.exe”, better known as Netcat, is a multifaceted tool used by administrators and attackers alike for network diagnostics and potentially as a vector for illicit access (V, 2023). The adept use of Netcat in network testing and data transfer can either uphold security or betray its breach, thereby forming a crucial element of forensic investigations (Buckbee, 2022). Understanding the output of `ls -la` transcends mere file listing; it's about dissecting the system's integrity at any moment, where each executable's history may contribute to unraveling a cyber event's narrative (Kamathe, 2020). Mastery of interpreting these details is a critical skill for any cybersecurity professional or forensic analyst, serving as the foundation for incident analysis and response. 2
Screenshot 1 – Creation of Yourname.TXT file 1. Create a file at the terminal that says hello world and send the output of the file to yourname.txt, where yourname is your first name. Take a screenshot of sending hello world to your file. The use of anyone else’s name may result in an academic integrity review by your professor. Please label your screenshot to receive full credit. Take a screenshot of the Your Name Text File being Created 3
Screenshot 2 – Finding the File Type of the Yourname.TXT file 2. Use the file command in Linux to identify the file type of the yourname.txt file, where yourname is your first name. The use of anyone else’s name may result in an academic integrity review by your professor. Please label your screenshot to receive full credit. Take a screenshot of using the File Command on the Your Name Text File 4
Screenshot 3 – Finding the File Type of the Yourname file (no Extension) 3. Use the file command in Linux to identify the file type of the yourname file, where yourname is your first name. The use of anyone else’s name may result in an academic integrity review by your professor. Please label your screenshot to receive full credit. Take a screenshot of using the File Command on the Your Name Text File 5
Your preview ends here
Eager to read complete document? Join bartleby learn and gain access to the full version
  • Access to all documents
  • Unlimited textbook solutions
  • 24/7 expert homework help