Skip to content

pm0641/Digital-Forensics

Folders and files

NameName
Last commit message
Last commit date

Latest commit

 

History

5 Commits
 
 
 
 
 
 
 
 

Repository files navigation

Logo - SURE ProEd

SURE ProEd (formerly SURE Trust)

Skill Upgradation for Rural youth Empowerment Trust


Student Details

Name: Ms. Pranjal Popat Manjare

Email ID:pranjalg14cs@gmail.com

College Name:MIT Arts Commerce and Science College

Branch/Specialization:Cyber and Digital Science

College ID:4467835


Course Details

Course Opted: Cyber Security & Ethical Hacking

Instructor Name: Hari Haran

Duration: November 2025 – April 2026 (6 Months)


Trainer Details

Trainer Name: Sen Hariharan

Trainer Email ID:harivk1815@gmail.com

Trainer Designation: Security Technician at FCIPL


Table of Contents


Overall Learning

During this course, I gained hands-on experience in the field of Digital Forensics and Cyber Security. I learned how to perform forensic disk imaging using FTK Imager and conduct structured forensic analysis using Autopsy. The course helped me understand how to extract digital artifacts, identify deleted and hidden files, detect encryption and extension mismatches, and interpret user activity patterns. I also strengthened my skills in documentation, analytical thinking, and following a systematic investigative approach — all of which are directly relevant to real-world cybersecurity and forensic investigations.


Projects Completed

Project 1: Digital Forensics Case Analysis


Project Introduction

Project 1: Digital Forensics Case Analysis

This project focused on performing a complete digital forensic investigation on a disk image to uncover system activity and identify potential indicators of suspicious behavior. Using industry-standard forensic tools — FTK Imager and Autopsy — a structured and non-destructive approach was applied to ensure the integrity of all digital evidence throughout the investigation.

The investigation involved examining file systems, recovering deleted files (including deleted executable files such as python3.exe and python.exe), analyzing timeline data, detecting encrypted files, identifying extension mismatches, and successfully detecting and removing a backdoor-type threat from the system.

→ View Full Project Repository on GitHub


Technologies Used

Tool Purpose
FTK Imager Forensic disk image acquisition — creates a bit-for-bit copy without modifying original data
Autopsy Disk image analysis — artifact extraction, deleted file recovery, timeline analysis, IoC detection

Domain: Digital Forensics | Cyber Security & Ethical Hacking

Key Techniques Applied:

  • Disk Imaging & Data Preservation
  • Artifact-Based Forensic Analysis
  • Deleted File Recovery
  • Timeline & Timestamp Analysis
  • Extension Mismatch & Encryption Detection
  • Indicators of Compromise (IoC) Identification

Roles and Responsibilities

As the sole team member for this project, I was responsible for the complete forensic investigation workflow:

  • Created the forensic disk image using FTK Imager, ensuring data integrity
  • Set up and configured Autopsy for forensic case analysis
  • Ran ingest modules to extract digital artifacts from the disk image
  • Performed file system analysis to explore directory structures
  • Conducted deleted file analysis and recovered removed executables
  • Analyzed timeline events to reconstruct chronological system activity
  • Detected encryption, extension mismatches, and suspicious user content
  • Identified and documented a backdoor-type threat found during the investigation
  • Prepared complete project documentation, screenshots, and the final report

Project Report

Key Findings Summary:

Finding Description
🗑️ Deleted Executables python3.exe, python.exe and other files recovered from deleted space
🔐 Encrypted Files Encryption detected — possible data concealment attempt
⚠️ Extension Mismatches Large number of files with mismatched extensions — indicates disguised files
🦠 Backdoor Threat Backdoor-type threat detected and successfully removed
📁 User Activity Web history, installed programs, and recent documents analyzed
🕐 Timeline Analysis Chronological system events reconstructed from timestamps

Project Architecture — Forensic Workflow:

Data Acquisition (FTK Imager)
        ↓
Data Preservation (Image integrity verified)
        ↓
Data Loading (Disk image loaded into Autopsy)
        ↓
Artifact Extraction (Ingest modules executed)
        ↓
Data Analysis (File systems, deleted & hidden files examined)
        ↓
Correlation & Interpretation (Artifacts analyzed together)
        ↓
Result Generation (Findings documented with screenshots)

→ View Full Project on GitHub


References


Learnings from LST and SST

LST and SST sessions helped me understand the importance of structured learning, peer collaboration, and real-world problem-solving. These sessions provided additional exposure to cybersecurity concepts beyond the technical curriculum and helped in building communication and presentation skills that are essential in a professional environment.


Community Services

During my internship period, I participated in multiple community-oriented activities that helped develop social responsibility and interpersonal skills alongside technical growth.

Activities Involved

  • Blood Donation – Donated blood and supported basic assistance tasks during the camp.
  • Tree Plantation Drive – Participated by planting trees and contributing to environmental improvement.
  • Helping Elder Citizens – Assisted elderly individuals with simple daily tasks and provided support where needed.

Impact / Contribution

  • Helped create a supportive environment during the blood donation camp.
  • Actively participated in promoting a greener and cleaner surrounding.
  • Offered personal assistance to elder citizens, strengthening community bonds.
  • Improved skills in communication, coordination, and social responsibility.

Photos

Community Service Photo 1 Community Service Photo 2

Certificate

The internship certificate serves as an official acknowledgment of the successful completion of the training period under SURE Trust. It validates the skills, hands-on experience, and contributions made during the Cyber Security & Ethical Hacking course.

Internship Certificate


Acknowledgments

  • Prof. Radhakumari Challa, Executive Director and Founder – SURE Trust
  • Hari Haran – Mentor & Trainer, Cyber Security & Ethical Hacking
  • SURE Trust Team – for providing this valuable learning opportunity to rural youth across India

About

This project focused on performing a complete digital forensic investigation on a disk image to uncover system activity and identify potential indicators of suspicious behavior. Using industry-standard forensic tools

Resources

Stars

Watchers

Forks

Releases

No releases published

Packages

 
 
 

Contributors