CT 378 ASSIGNMENT
Student Name: AKASH GURPUR
Student ID: 32763807
1 | P a g e
INDEX
1. Executive
... [Show More] Summary……………………………………..…………………………………………….3
2. Methodology………………………………………………………………………………………...4 - 5
3. Case Details………………………………………………………………………………….....……6 - 9
3.1.Personal Involved…………………………………………………………………………..…….6
3.2.Key Dates.…………………………………………………………………………………………….6
3.3.Initial Information………………………………………………………………………………...6
3.4.Suspects……………………………………………………………………………………………….8
3.5.Missing Details……………………………………………………………………………………..8
3.6.Assumptions…………………………………………………………………………………….8 - 9
4. Evidence……………………………………………………………………………………………10 -16
5. Scenario……………………………………………………………………………………………..17 -20
5.1.Scenario 1……………………………………………………………………………….…..17 - 18
5.2.Scenario 2…………………………………………………………………………………………..19
5.3.Scenario 3……………………………………………………………………………………19 - 20
5.4.Culprit Table……………………………………………………………………………………….20
6. Conclusion………………………………………………………………………………………………..21
7. Reference…………………………………………………………………………………………………22
8. Appendix A………………………………………………………………………………………..23 - 26
8.1.Person of Interest……………………………………………………………………………….23
8.2.Association Diagram…………………………………………………………………………...23
8.3.Time Line…………………………………………………………………………………………….24
8.4.Chain of Custody…………………………………………………………………………………25
8.5.Software……………………………………………………………………………………………..26
9. Appendix B……………………………………………………………………………………………….27
9.1.Hash Calculation…………………………………………………………………………………27
10.Appendix C…………………………………………………………..……………………………28 - 34
10.1. Evidence Screen Shots……………………………...……………………..…28 - 34
2 | P a g e
1. EXECUTIVE SUMMARY
On 1st December 2009, Mr Greene purchased a workstation from a second-hand store.
Going through the workstation, Mr Greene found some suspicious files relating to drugs.
Worried he reported this finding to the police on the 2nd of December 2009. After which an
Image file was created and passed on to the forensic investigator to help identify evidence.
According to the police investigation, the work station belonged to Mr Jo, a former
employee of m57.biz a patent research company. This forensic report has followed strict
policies in safeguarding the evidence. Autopsy and OS Forensics were used to extract
evidence from the image drive given. The hash of the image has been collected start and
end of the case. The scenario section discusses the evidence and how each one can be used
to pinpoint a suspect. After which a small table will help conclude who the actual culprit is. [Show Less]