Draft A Report And Presentation Highlighting" Digital Forensics"
- Subject Code :
BIT362
- University :
Melbourne Polytechnic Exam Question Bank is not sponsored or endorsed by this college or university.
- Country :
Australia
Assignment Overview
You are required to forensically investigate how to identified (methods/techniques) sources of data on one of the categories listed in the following table. This involves you uploading, downloading and identify who can read data and determine how you can prove who uploads, downloads, watch/read content. You are to use spoofing techniques such as IP/MAC/email spoofing to see if you can still identify the source. Check timestamp issues. You must investigate five (5) forensics techniques throughout your investigation. It is expected to use multiple tools and techniques to establish the claim.
Do NOT engaged in questionable activities (either academic misconduct or illegal activities)
Always submit your own work (e.g. your contribution)
Make sure there is significant proof such as screenshots, video, logs with timestamp, etc of your own work.
You can use any tool(s). Such as Wireshark, Netminer, windows event viewer, logs, etc. Or it is beneficial to learn new tools.
Topics:
You must choose and have your lecturer/tutor approved and record your topic. No two student can do the same topic.
Topic | Student No. | Student Name |
---|---|---|
Bitcoin | ||
Bittorrent | ||
Emails | ||
Darknet | ||
Cloud | ||
Non-fungible tokens | ||
Gumtree | ||
Jora | ||
Dropbox | ||
SugarSync | ||
NAT/PAT | ||
VPN | ||
Google Cloud Platform | ||
AWS | ||
Azure | ||
Docker | ||
Load Balancer | ||
Viruses | ||
Randomware | ||
Virtual box | ||
OrangeHRM | ||
A1 HER | ||
SimpleHRM | ||
Sentrifugo | ||
ADempiere | ||
IceHRM | ||
OpenHRM | ||
Apache OrBiz | ||
OpenBoxes | ||
OpenLMIS | ||
xTuple | ||
SuiteCRM | ||
Odoo | ||
X2CRM | ||
Vitiger | ||
Moodle | ||
Ansible | ||
FreeCAD | ||
SALOME | ||
TimelineJS KnightLab | ||
Round Cude (free Email Server) | ||
PacketFence (free NAC) |
Best Techniques:
Install the software under investigation in a sandbox like Cuckoo then, perform normal activities with it. Trace these actives with the sandbox and other forensics methods such as code conversion, network/packet sniffer, source code analysis, events/logs triggered, etc.