Question: Case Description Joe Jacobs, the security officer responsible for the network of a corporation, is suspecting that the machine used by one of the employees

Case Description Joe Jacobs, the security officer responsible for the network of a corporation, is suspecting that the machine used by one of the employees has been infected with malware, after visiting some compromised website. The suspicion was based on observing significant departure of the infected host activity from the network baselines. Network traffic sample involving the compromised host activity is provided in TCPDUMP format (as a separate file: elec570-project-2020.pcap). As a forensic analyst, you have been tasked to analyze the network capture and decode the suspicious activities involved. The trace file can be downloaded at: https://drive.google.com/open?id=1gSsbAFZjYO8hpmlAYInyBbyreCC-zh79 Task More specifically, you must provide answers to the following questions: 1. Identify the following characteristics for the infected host (2.5%): a. IP address of computer b. Host name of computer c. MAC address of computer d. Operating System (OS)
Step by Step Solution
There are 3 Steps involved in it
Get step-by-step solutions from verified subject matter experts
