easteregg Leprechaun
  • Patrick Collins
    • Home
    • Blog
      • eJPTv1 Certification
      • Conferences

      • Blog Home
    • Travel Photos
    • Notes
    • Graduation!
    • Projects and University Work
      • Honours Project
      • Web App Pen Test

      • All projects
    • Socials
    • About Me

    Digital Forensics Investigation

    fingerprint

    About

    • Module: CMP209
    • Title: Digital Forensics 1
    • Grade: A

    A fun module in my second year was Digital Forensics 1. The assignment was a group project, carrying out a digital forensic investigation on a suspect's disk image for evidence. We then had to create a Court Report from our findings.

    My team for this investigation was: Myself, Imogen Rose, Riccardo Raso and Vanessa-Maria Ispas-Sava. We were team "SPEKTOR".

    Scenario

    In our capacity as digital forensic examiners we had been summoned to the home of John Doe where we were required to seize any computer equipment and investigate it. It was suspected that the computer contained illicit materials. For the purpose of this investigation we had to assume that any material of an ornithological nature was illicit.

    Tools

      Our team used many tools to carry out this investigation. They were:

    • Autopsy 4.18.0
    • Zeitline
    • John The Ripper Jumbo
    • ClamAV
    • Fred (Forensic Registry Editor)
    • RegRipper 3.0
    • Bash scripts
    • Ubuntu Virtual Machines

    I really enjoyed this group assignment, and delving into the world of digital forensics. It's really impressive, and frightening, what can be found just by looking through a forensic disk image.

    Court Report

    Please DO NOT plagiarise our report. You will be caught, it's not worth it.

    Copyright © 2022-2025 Patrick Collins
    Contact Me: Contact@paddylonglegs.site
    Background created by freepik