Name: Ms. Pranjal Popat Manjare
Email ID:pranjalg14cs@gmail.com
College Name:MIT Arts Commerce and Science College
Branch/Specialization:Cyber and Digital Science
College ID:4467835
Course Opted: Cyber Security & Ethical Hacking
Instructor Name: Hari Haran
Duration: November 2025 – April 2026 (6 Months)
Trainer Name: Sen Hariharan
Trainer Email ID:harivk1815@gmail.com
Trainer Designation: Security Technician at FCIPL
- Overall Learning
- Projects Completed
- Project Introduction
- Technologies Used
- Roles and Responsibilities
- Project Report
- References
- Learnings from LST & SST
- Community Services
- Certificate
- Acknowledgments
During this course, I gained hands-on experience in the field of Digital Forensics and Cyber Security. I learned how to perform forensic disk imaging using FTK Imager and conduct structured forensic analysis using Autopsy. The course helped me understand how to extract digital artifacts, identify deleted and hidden files, detect encryption and extension mismatches, and interpret user activity patterns. I also strengthened my skills in documentation, analytical thinking, and following a systematic investigative approach — all of which are directly relevant to real-world cybersecurity and forensic investigations.
Project 1: Digital Forensics Case Analysis
This project focused on performing a complete digital forensic investigation on a disk image to uncover system activity and identify potential indicators of suspicious behavior. Using industry-standard forensic tools — FTK Imager and Autopsy — a structured and non-destructive approach was applied to ensure the integrity of all digital evidence throughout the investigation.
The investigation involved examining file systems, recovering deleted files (including deleted executable files such as python3.exe and python.exe), analyzing timeline data, detecting encrypted files, identifying extension mismatches, and successfully detecting and removing a backdoor-type threat from the system.
→ View Full Project Repository on GitHub
| Tool | Purpose |
|---|---|
| FTK Imager | Forensic disk image acquisition — creates a bit-for-bit copy without modifying original data |
| Autopsy | Disk image analysis — artifact extraction, deleted file recovery, timeline analysis, IoC detection |
Domain: Digital Forensics | Cyber Security & Ethical Hacking
Key Techniques Applied:
- Disk Imaging & Data Preservation
- Artifact-Based Forensic Analysis
- Deleted File Recovery
- Timeline & Timestamp Analysis
- Extension Mismatch & Encryption Detection
- Indicators of Compromise (IoC) Identification
As the sole team member for this project, I was responsible for the complete forensic investigation workflow:
- Created the forensic disk image using FTK Imager, ensuring data integrity
- Set up and configured Autopsy for forensic case analysis
- Ran ingest modules to extract digital artifacts from the disk image
- Performed file system analysis to explore directory structures
- Conducted deleted file analysis and recovered removed executables
- Analyzed timeline events to reconstruct chronological system activity
- Detected encryption, extension mismatches, and suspicious user content
- Identified and documented a backdoor-type threat found during the investigation
- Prepared complete project documentation, screenshots, and the final report
Key Findings Summary:
| Finding | Description |
|---|---|
| 🗑️ Deleted Executables | python3.exe, python.exe and other files recovered from deleted space |
| 🔐 Encrypted Files | Encryption detected — possible data concealment attempt |
| Large number of files with mismatched extensions — indicates disguised files | |
| 🦠 Backdoor Threat | Backdoor-type threat detected and successfully removed |
| 📁 User Activity | Web history, installed programs, and recent documents analyzed |
| 🕐 Timeline Analysis | Chronological system events reconstructed from timestamps |
Project Architecture — Forensic Workflow:
Data Acquisition (FTK Imager)
↓
Data Preservation (Image integrity verified)
↓
Data Loading (Disk image loaded into Autopsy)
↓
Artifact Extraction (Ingest modules executed)
↓
Data Analysis (File systems, deleted & hidden files examined)
↓
Correlation & Interpretation (Artifacts analyzed together)
↓
Result Generation (Findings documented with screenshots)
- Autopsy Digital Forensics Platform
- FTK Imager – Exterro/AccessData
- NIST – Digital Forensics
- Wikipedia – Digital Forensics
- SURE Trust Official Website
LST and SST sessions helped me understand the importance of structured learning, peer collaboration, and real-world problem-solving. These sessions provided additional exposure to cybersecurity concepts beyond the technical curriculum and helped in building communication and presentation skills that are essential in a professional environment.
During my internship period, I participated in multiple community-oriented activities that helped develop social responsibility and interpersonal skills alongside technical growth.
- Blood Donation – Donated blood and supported basic assistance tasks during the camp.
- Tree Plantation Drive – Participated by planting trees and contributing to environmental improvement.
- Helping Elder Citizens – Assisted elderly individuals with simple daily tasks and provided support where needed.
- Helped create a supportive environment during the blood donation camp.
- Actively participated in promoting a greener and cleaner surrounding.
- Offered personal assistance to elder citizens, strengthening community bonds.
- Improved skills in communication, coordination, and social responsibility.
The internship certificate serves as an official acknowledgment of the successful completion of the training period under SURE Trust. It validates the skills, hands-on experience, and contributions made during the Cyber Security & Ethical Hacking course.
- Prof. Radhakumari Challa, Executive Director and Founder – SURE Trust
- Hari Haran – Mentor & Trainer, Cyber Security & Ethical Hacking
- SURE Trust Team – for providing this valuable learning opportunity to rural youth across India



