Summary:In this mid-term, we will be applying various techniques and tools to analyze digital data and extract hidden information. You will be using an exif extraction tool to extract metadata from an image, using steganography to hide a message in an image, using Wireshark or tcpdump to analyze network data, and finally performing a forensic analysis using a forensic image or a systems analysis using your own system.
Exif Data Extraction
1. Download and install an Exif extraction tool (such as or .
2. Take any image taken by your phone, then run an Exif extraction tool on it to extract the metadata.
Think critically about the data that was extracted and write a report. What kind of data has your phone been sharing every time you upload a picture to social media, send a picture through a wireless provider’s network? Who put it there and why? What purpose does it serve? Were you unaware or unconcerned? What implications does this have on privacy and security?
Steganography
As steganography is often used to conceal information, learning about it can be valuable for digital forensics professionals who need to detect and extract hidden information from digital media. Using an online tool or software such as and , hide a message within a picture and share it on your site. Create a situation where steganography could be of use and share it on your blog/site. Provide your own personal opinion on the offer of underrated skill.
Network Analysis
Download and install or tcpd.
Use Wireshark or TCPDump to capture network traffic on your computer from your own network.
Analyze the network traffic and write a brief report on what you were able to learn, including:
The number and types of packets captured (know the types: TCP, UDP, IP, ICMP, & SNMP!)
Information on the source and destination of the packets
The type of network protocol used (Know what protocols are, it’s a crucial component in networking).
Any relevant information or trends you noticed in the network traffic
Choice of either A or B
A: Forensic Analysis
Obtain a forensic image (such as a .img or .dd file).
Download and install a forensic analysis tool (such as Autopsy or Sleuth Kit).
Use the forensic analysis tool to analyze the forensic image and write a brief report 1-page report on what you were able to learn, including:
1. The file system used on the image
2. A list of the files and directories on the image
3. Any deleted files or artifacts you were able to recover
4. Any other relevant information or trends you noticed during your analysis
5. The learning process
6. Insights gained. B: Systems Analysis (Alternative)
Estimated Length 1+ pages
Objective: To learn how to use the command line to obtain information about your MacOS/Windows PC system and identify potential areas for optimization.
Instructions:
- Open the Terminal/Command application on your MacOS/Windows PC system.
- On macOS This can be found in the Utilities folder within the Applications folder.
- On Windows: This can be done by pressing the Windows key + X and selecting “Command Prompt” or by typing “cmd” in the Start menu search bar and selecting the Command Prompt application.
2. Run the following command to generate a text file that contains information about your system:
macOS:
system_profiler > ~/Desktop/system_report.txt
Windows PC:
systeminfo > C:UsersYourUsernameDesktopsystem_report.tx
3 . This will create a text file on your desktop named “system_report.txt”. Open the file and carefully review its contents to identify any areas where your system might be wasting resources, such as:
- Large files that you no longer need
- Unused applications that are taking up space on your hard drive
- Outdated backups or system files that can be safely deleted
Use the command line to delete any files or applications that you have identified as waste. For example, to delete a file named “large_file.txt”, you would run the following command:
macOS
rm ~/large_file.txt
WindowsPC
rm ~/large_file.txt
5. Repeat this process until you have identified and eliminated all waste on your system.
6. Write a report that summarizes your findings and the steps you took to optimize your MacOS system. The report should include:
- A description of the steps you took to generate the system report
- A summary of the results of your analysis, including the total amount of space saved by deleting waste from -your system
- how it has impacted your understanding of using the command line
Note: Before deleting any files or applications, make sure you have a backup of your important data, and only delete files or applications that you are certain you no longer need. This assignment is intended to be completed on a personal MacOS system, not on a system that is used for critical or sensitive purposes.
7. Submit your report as a blog article by submitting it URL.
Write 5-6 APA format paper with at least 3 peer reviewed resources for all the parts required above with any additional findings, learnings or screenshots if applicable.
Leave a Reply
You must be logged in to post a comment.