Memory Forensics – Answers
Part 1: Forensic memory analysis using Volatility 3 Activity 1: Identifying OS Information Dump analysis helps determine the OS profile. It is important to know the information about the operating system that was in use prior to the investigation. The command “-f” is used to specify the file and also specify the plugin required, in […]
Memory Forensics
Introduction to Memory Forensics Memory Forensics is the analysis of memory files acquired from digital devices. The primary purpose of Memory Forensics is to acquire useful information from the RAM that aids in the preparation of forensically sound evidence. Learning Outcome You will be able to utilize built-in Volatility 3 plugins for memory analysis tasks. […]
Mobile Forensics – Answers
Part 1: Android Forensics Analysis using ALEAPP 1. Copy the folder “Mobile Forensics” into the virtual machine desktop. 2. Unzip the “Android Logical Image” folder. 3. Create a new folder called “Android”. This folder will be selected as the output folder to store the parsed files. 4. Open the kali linux terminal and navigate to […]
Mobile Forensics
Introduction to Mobile Forensics Mobile forensics is the process of recovering digital evidence from mobile devices using accepted methods. Unlike traditional digital forensics processes, mobile forensics solely focuses on retrieving information from mobile devices such as smartphones, androids, and tablets. Learning Outcome You will be able to create a new case on ALEAPP and iLEAPP […]
Network Forensics – Answers
Introduction to Network Forensics? Network forensics is a sub-branch of digital forensics relating to the monitoring and analysis of computer network traffic for the purposes of information gathering, legal evidence, or intrusion detection. Learning Outcome You will be able to upload and analyse pcap file using wireshark. You will be able to explain filtering techniques […]
Network Forensics
Introduction to Network Forensics? Network forensics is a sub-branch of digital forensics relating to the monitoring and analysis of computer network traffic for the purposes of information gathering, legal evidence, or intrusion detection. Learning Outcome You will be able to upload and analyse pcap file using wireshark. You will be able to explain filtering techniques […]
Cryptography – Answers
Section 1: Caesar Cypher This first section will cover the Caesar cypher, an ancient cypher used by Roman armies around 100 BC. The Romans created the Caesar Cypher, but the name originated from the emperor of the Roman Empire at the time, Julius Caesar. Julius Caesar utilised this secret encryption for communicating with commanders on […]
Cryptography
This document goes over the significance of cyphers and their usage in history. Alongside this we will learn how to use cyberchef to crack these puzzling cyphers and develop an understanding of how and why they are used both historically and in the modern times. Introduction Cryptography is an ancient art used mainly in military […]