Question: please assist with this digital forensic study case: Provide the detailed step on how best to solve this case. ( how can I share the
please assist with this digital forensic study case:
Provide the detailed step on how best to solve this case. how can I share the KidnapVictimLaptop.E image for your analysis?
Case: The son of a prominent businessman has been kidnapped. He is a student at a university in the city and you are told that he is very fond of technology especially computers. It is also noted that the student besides having a fair share of sponsorship from his parents had a side hustle to supplement his income at the university. You and your colleagues have been hired to solve this case as digital forensics investigators. Luckily, you have access to the student's laptop which was imaged already using the EnCase Format.F to give as image KidnapVictimLaptop.E for your analysis.
Use the following image and suggested tools in this case.
Suggested tools for the case analysis
Autopsy
Password cracking tool eg John the Ripper
Gaberchef
Case Activities: University Student Kidnapping Case
By stating your plans and procedures, outline how you and your team were able to find the identify the kidnappers in this gase Kqu are to document and tag any notablesuspicious files and activities with appropriate comments for your report as well as for other investigators to use, for example, one of the zipped files in this case is encrypted and contains information of great value, you need decrypt it tag and comment on it
Other activities underlineG answers to questions to include in your report among others include note you are not only limited to these activities in solving your case
Note the users of the laptop, what operating systems they are using and interesting activities they are carrying out useful for solving the case.
Note and comment on any mismatches in file extensions and content.
Note archivedencrypted files of interest, tag and comment on them.
Note deleted files of interest, tag and comment on them.
Note files in slack space of interest, tag and comment on them.
Note encrypted files of interest, what encryption was used to encrypt them. Can you decrypt them?
Are there any URLs usedvisited by the student that are suspicious or of note to the case? List them and give reasons why they are suspicious. Check if there are any that they could have used in their side hustle.
Check any Bitcoin wallets the student used for his elicit activities.
The student kept a database of sales of his elicit activities drugs Note which database contains information about the products sold comment on which ones were best sellers for specific months.
Note the user accounts used on the laptop. Document their association with social media sites like Twitter, WhatsApp etc. if any.
Note any encrypted zipped files of interest, use the million password file in the laptop to conduct a dictionary attack to find its password and decrypt it What is its value?
Is there evidence that the student was undercutting his supplier boss Identify what Bitcoin account wallet the student used to hide his sales.
What is the name and contact details of the "boss"?
What threat did the student receive from his boss about his under dealings?
Step by Step Solution
There are 3 Steps involved in it
1 Expert Approved Answer
Step: 1 Unlock
Question Has Been Solved by an Expert!
Get step-by-step solutions from verified subject matter experts
Step: 2 Unlock
Step: 3 Unlock
