CCSI 460 Experience Tradition/newtonhelp.com - PowerPoint PPT Presentation

About This Presentation
Title:

CCSI 460 Experience Tradition/newtonhelp.com

Description:

For more course tutorials visit www.newtonhelp.com Analyze the wireshark packet capture file called week1.pcap in doc sharing. view the packet and produce a short report including the following date and time of transactions protocol used to communicate with the server All IPs utilized Mac Address of PC Communicating with the server – PowerPoint PPT presentation

Number of Views:2
Slides: 17
Provided by: Maugha16

less

Transcript and Presenter's Notes

Title: CCSI 460 Experience Tradition/newtonhelp.com


1
CCSI 460 Experience Tradition/newtonhelp.com
2
CCSI 460 Experience Tradition/newtonhelp.com
  • CCSI 460 Week 1 Homework
  • For more course tutorials visit
  • www.newtonhelp.com
  •  
  • Analyze the wireshark packet capture file called
    week1.pcap in doc sharing. view the packet and
    produce a short report including the following
  •  
  • date and time of transactions
  • protocol used to communicate with the server
  • All IPs utilized
  • Mac Address of PC Communicating with the server

3
CCSI 460 Experience Tradition/newtonhelp.com
  • CCSI 460 Week 1 Lab Survey of Forensic Toolkits
  • For more course tutorials visit
  • www.newtonhelp.com
  •  
  • CCSI 460 Week 1 Lab Survey of Forensic Toolkits

4
CCSI 460 Experience Tradition/newtonhelp.com
  • CCSI 460 Week 2 Current Issues in Digital
    Forensics
  • For more course tutorials visit
  • www.newtonhelp.com
  •  
  • CCSI 460 Week 2 Current Issues in Digital
    Forensics

5
CCSI 460 Experience Tradition/newtonhelp.com
  • CCSI 460 Week 2 Homework
  • For more course tutorials visit
  • www.newtonhelp.com
  •  
  • CCSI 460 Week 2 Homework

6
CCSI 460 Experience Tradition/newtonhelp.com
  • CCSI 460 Week 2 MD5SUM Hash Value Image Report
  • For more course tutorials visit
  • www.newtonhelp.com
  •  
  • CCSI 460 Week 2 MD5SUM Hash Value Image Report

7
CCSI 460 Experience Tradition/newtonhelp.com
  • CCSI 460 Week 3 Homework
  • For more course tutorials visit
  • www.newtonhelp.com
  •  
  • Week 3 homework
  •  
  • Download the picture Doc  Sharing called
    hidden.jpg.
  • Use md5um to get the hash value of the file and
    size.
  • Download the program steghide.zip from Doc
    Sharing.
  • You will use this program to hide another picture
    inside the hidden.jpg image (its a command line
    program so you will need some time working with
    it).
  • Take a picture of yourself or use a phone that
    you already have. You will need to embed the
    photo inside the hidden.jpg fls using steghide.

8
CCSI 460 Experience Tradition/newtonhelp.com
  • CCSI 460 Week 3 Lab Report Internet Research
  • For more course tutorials visit
  • www.newtonhelp.com
  •  
  • CCSI 460 Week 3 Lab Report Internet Research

9
CCSI 460 Experience Tradition/newtonhelp.com
  • CCSI 460 Week 4 Homework
  • For more course tutorials visit
  • www.newtonhelp.com
  •  
  • Analyze the Wireshark packet capture fils
    called ftp.pcap in Doc Sharing.View the packets
    and produce a short report including the
    following.
  • Date and time of transactions
  • Protocol used communicate with server
  • All IPS utilized
  • Usename of connection
  • Password of connection

10
CCSI 460 Experience Tradition/newtonhelp.com
  • CCSI 460 Week 4 Lab Report Hard Drive Image
    Analysis
  • For more course tutorials visit
  • www.newtonhelp.com
  •  
  • Lab Number and Title Lab4 Hard Drive Image
    Analysis
  • Summary of Findings
  • The source code was exposed by means of criminal
    activity that Denny Vette was involved in through
    1/2/02. There were many items found through the
    analysis of the hard drive that indicate hacking,
    steganographic, and cryptographic activities.
  • Main evidence recovered was a deleted item from
    the sent folder of Microsoft Outlook Express.
    This sent email included an attachment which is
    suspected of being a steganographic image (a file
    hidden within a .jpg photo file). Denny Vette
    sent the e-mail tomrbig_at_second.source.ru and the
    body of the e-mail stated Big, heres the
    picture that I promised you. As agreed, youll
    pay me 100k now and the

11
CCSI 460 Experience Tradition/newtonhelp.com
  • CCSI 460 Week 5 Homework
  • For more course tutorials visit
  • www.newtonhelp.com
  •  
  • Stalk yourself or a family member. Pretend that
    you a cyber stalker and you are going to stalk
    yourself.
  • Provide a summary on the information that you
    found about yourself. Are there things you found
    that surprised you? Do you feel you have control
    over your information on the internet? Please do
    not provide the specific information you found
    concerning yourself, only provide a summary of
    your thought concerning it.
  • Tip Try searching your address, phone number,
    Facebook  page, Twitter account, and even maiden
    name, etc. Think uot-of-the-box for this one. You
    should try a variety of internet resources.

12
CCSI 460 Experience Tradition/newtonhelp.com
  • CCSI 460 Week 5 Lab Report Bid ridding and Cyber
    Stalking
  • For more course tutorials visit
  • www.newtonhelp.com
  •  
  • CCSI 460 Week 5 Lab Report Bid ridding and
    Cyber-Stalking

13
CCSI 460 Experience Tradition/newtonhelp.com
  • CCSI 460 Week 6 Homework
  • For more course tutorials visit
  • www.newtonhelp.com
  •  
  • Week 6 homework
  •  
  • Mobile Phone Photo Analysis
  • Your client has been accused of a crime. You have
    take the clients phone and acquired the image
    called client.jpg. The hash for the files is
  • 059B138917504F80599E556F3017B246.
  • The client says that this photo will help to
    clear him or her of the investigation. You need
    to determine the date, time, and locations of the
    photo. Look for the actual location (not the GPS
    coordinates,

14
CCSI 460 Experience Tradition/newtonhelp.com
  • CCSI 460 Week 7 Course Project Forensic System
    Image Investigation
  • For more course tutorials visit
  • www.newtonhelp.com
  •  
  • CCSI 460 Week 7 Course Project Forensic System
    Image Investigation

15
CCSI 460 Experience Tradition/newtonhelp.com
  • CCSI 460 Week 7 Homework Honeypot Research
  • For more course tutorials visit
  • www.newtonhelp.com
  •  
  • Research two different honeypots that are
    available to use free or open source. List the
    sites and honeypots that you selected.
  • Discuss the benefits of utilizing a virtual
    machine for the implementation of the honeypots
    that you selected (one paragraph).
  • What resources would you need to be able to set
    up and utilize a honeypot for the https//devryu.i
    nstructure.com domain (two paragraphs)?
  •  

16
CCSI 460 Experience Tradition/newtonhelp.com
Write a Comment
User Comments (0)
About PowerShow.com