Skip to content

I performed an investigation by using forensic imaging and other forensic tools on multiple suspects’ hard drives.

Notifications You must be signed in to change notification settings

andrewsingleton2/Digital-Forensics

Folders and files

NameName
Last commit message
Last commit date

Latest commit

 

History

10 Commits
 
 
 
 

Repository files navigation

Digital-Forensics Project

I performed a hands-on investigation by using forensic imaging and other forensic tools on multiple suspects’ hard drives and memory images to document and create a full in-depth 73-page Chain of Custody Report and an Evidence Intake Form in the role of a Digital Forensic Examiner to discover evidence and document the timeline of events in our evidence collection process, for a drug possession and drug trafficking operation case. Performed the four steps of collection, examination, analysis, and reporting in digital forensics.

This Forensic Evidence Report contains a table of contents, summary, hashes of original evidence, malware analysis, a timeline of documented forensic evidence, and contact lists discovered during the investigation (names, emails, phone numbers, addresses). Encrypted document artifacts showing logs, books, business plans, suspect's email, browser history, and images found on hard drives showing shipping labels, drugs, money, plane tickets, personal life memories, and cracked passwords.

This case contained three main suspects, however, we also discovered a fourth suspect by using digital forensics. In this project, two other students and I utilized MD5 Checker to verify the integrity of the drives and memory images before using FTK Imager to create a copy of the drives. Used Autopsy to search through three malicious computer hard drives/memory images in a virtual environment. We searched through emails, browser history, messaging apps, and documents, and utilized QuickStego to discover hidden messages embedded within images. When we completed the report, I wrote an Evidence Disposition and Forensic Examiner’s Conclusion to include at the end.

Skills:

Steganography · MD5 · Autopsy · FTK Imager · Chain of Custody · SHA1 · VMware

Table of Contents from Forensic Report

image image

-

image

Source from image 3:

https://www.guru99.com/digital-forensics.html

About

I performed an investigation by using forensic imaging and other forensic tools on multiple suspects’ hard drives.

Resources

Stars

Watchers

Forks

Releases

No releases published

Packages

No packages published