Page 1

CCSI 460 Week 1 Homework

For more course tutorials visit

www.tutorialrank.com Analyze the wireshark packet capture file called week1.pcap in doc sharing. view the packet and produce a short report including the following

date and time of transactions protocol used to communicate with the server All IPs utilized Mac Address of PC Communicating with the server

==============================================

CCSI 460 Week 1 Lab Survey of Forensic Toolkits

For more course tutorials visit


www.tutorialrank.com CCSI 460 Week 1 Lab Survey of Forensic Toolkits ==============================================

CCSI 460 Week 2 Current Issues in Digital Forensics

For more course tutorials visit

www.tutorialrank.com CCSI 460 Week 2 Current Issues in Digital Forensics ==============================================

CCSI 460 Week 2 Homework

For more course tutorials visit

www.tutorialrank.com


CCSI 460 Week 2 Homework ==============================================

CCSI 460 Week 2 MD5SUM Hash Value Image Report

For more course tutorials visit

www.tutorialrank.com CCSI 460 Week 2 MD5SUM Hash Value Image Report ==============================================

CCSI 460 Week 3 Homework

For more course tutorials visit

www.tutorialrank.com Week 3 homework

ï‚·

Download the picture Doc Sharing called hidden.jpg.


Use md5um to get the hash value of the file and size.

Download the program steghide.zip from Doc Sharing.

You will use this program to hide another picture inside the hidden.jpg image (it’s a command line program so you will need some time working with it).

Take a picture of yourself or use a phone that you already have. You will need to embed the photo inside the hidden.jpg fls using steghide.

Get the new hash value.

Submit the new files (this one should have both pictures in it) and submit both hash values as well as files sizes.

You should not have a password (we will NOT use password when using steghide…. Hint…..hint).

In a few sentences, explain how this method could enable criminals as easy path to hiding information and how we could detect it.

Submit your assignment to the Dropbox, located at the top of this page.

==============================================

CCSI 460 Week 3 Lab Report Internet Research


For more course tutorials visit

www.tutorialrank.com CCSI 460 Week 3 Lab Report Internet Research ==============================================

CCSI 460 Week 4 Homework

For more course tutorials visit

www.tutorialrank.com Week 4 homework

Analyze the Wireshark packet capture fils called ftp.pcap in Doc Sharing.View the packets and produce a short report including the following. 

Date and time of transactions

Protocol used communicate with server

All IPS utilized

Usename of connection


Password of connection

Site visited

Submit your assignment to the Dropbox, located at the top of this page.

==============================================

CCSI 460 Week 4 Lab Report Hard Drive Image Analysis

For more course tutorials visit

www.tutorialrank.com Lab Number and Title: Lab4 – Hard Drive Image Analysis Summary of Findings: The source code was exposed by means of criminal activity that Denny Vette was involved in through 1/2/02. There were many items found through the analysis of the hard drive that indicate hacking, steganographic, and cryptographic activities. Main evidence recovered was a deleted item from the sent folder of Microsoft Outlook Express. This sent email included an attachment which is suspected of being a steganographic image (a file hidden within a .jpg photo file). Denny Vette sent the e-mail tomrbig@second.source.ru and the body of the e-mail stated “Big, here’s


the picture that I promised you. As agreed, you’ll pay me $100k now and the rest later.” It is believed that the photo attachment contains a file with the source code in it.

==============================================

CCSI 460 Week 5 Homework

For more course tutorials visit

www.tutorialrank.com Week 5 homework

Stalk yourself or a family member. Pretend that you a cyber stalker and you are going to stalk yourself. 

Provide a summary on the information that you found about yourself. Are there things you found that surprised you? Do you feel you have control over your information on the internet? Please do not provide the specific information you found concerning yourself, only provide a summary of your thought concerning it.

Tip: Try searching your address, phone number, Facebook page, Twitter account, and even maiden name, etc. Think uot-of-the-box


for this one. You should try a variety of internet resources. Remember to think like a criminal. You want to find out as much as possible of what is out there about you. Submit your assignment to the Dropbox, located at the top of this page.

==============================================

CCSI 460 Week 5 Lab Report Bid ridding and Cyber Stalking

For more course tutorials visit

www.tutorialrank.com CCSI 460 Week 5 Lab Report Bid ridding and Cyber-Stalking ==============================================

CCSI 460 Week 6 Homework

For more course tutorials visit

www.tutorialrank.com


Week 6 homework

Mobile Phone Photo Analysis 

Your client has been accused of a crime. You have take the client’s phone and acquired the image called client.jpg. The hash for the files is:

059B138917504F80599E556F3017B246. 

The client says that this photo will help to clear him or her of the investigation. You need to determine the date, time, and locations of the photo. Look for the actual location (not the GPS coordinates, but you’ll need to use those to find the location).What steps should be taken next to validate the claims of the client?

Submit your assignment to the Dropbox, located at the top of this page.

==============================================

CCSI 460 Week 7 Course Project Forensic System Image Investigation

For more course tutorials visit

www.tutorialrank.com


CCSI 460 Week 7 Course Project Forensic System Image Investigation ==============================================

CCSI 460 Week 7 Homework Honeypot Research

For more course tutorials visit

www.tutorialrank.com 

Research two different honeypots that are available to use free or open source. List the sites and honeypots that you selected.

Discuss the benefits of utilizing a virtual machine for the implementation of the honeypots that you selected (one paragraph).

What resources would you need to be able to set up and utilize a honeypot for the https://devryu.instructure.com domain (two paragraphs)?

==============================================


Profile for b.r.oadhurstcartwright348987.2

CCSI 460 Enhance teaching - tutorialrank.com  

For more course tutorials visit www.tutorialrank.com Analyze the wireshark packet capture file called week1.pcap in doc sharing. view the p...

CCSI 460 Enhance teaching - tutorialrank.com  

For more course tutorials visit www.tutorialrank.com Analyze the wireshark packet capture file called week1.pcap in doc sharing. view the p...

Advertisement