1 / 16

CCSI 460 Believe Possibilities--snaptutorial.com

Analyze the wireshark packet capture file called week1.pcap in doc sharing. view the packet and produce a short report including the following<br> <br>date and time of transactions<br>protocol used to communicate with the server<br>All IPs utilized<br>Mac Address of PC Communicating with the server<br>

Download Presentation

CCSI 460 Believe Possibilities--snaptutorial.com

An Image/Link below is provided (as is) to download presentation Download Policy: Content on the Website is provided to you AS IS for your information and personal use and may not be sold / licensed / shared on other websites without getting consent from its author. Content is provided to you AS IS for your information and personal use only. Download presentation by click this link. While downloading, if for some reason you are not able to download a presentation, the publisher may have deleted the file from their server. During download, if you can't get a presentation, the file might be deleted by the publisher.

E N D

Presentation Transcript


  1. CCSI 460 Believe Possibilities--snaptutorial.com

  2. CCSI 460 Believe Possibilities--snaptutorial.com CCSI 460 Week 1 Homework For more classes visit www.snaptutorial.com Analyze the wireshark packet capture file called week1.pcap in doc sharing. view the packet and produce a short report including the following date and time of transactions protocol used to communicate with the server All IPs utilized

  3. CCSI 460 Believe Possibilities--snaptutorial.com CCSI 460 Week 1 Lab Survey of Forensic Toolkits For more classes visit www.snaptutorial.com CCSI 460 Week 1 Lab Survey of Forensic Toolkits

  4. CCSI 460 Believe Possibilities--snaptutorial.com CCSI 460 Week 2 Current Issues in Digital Forensics For more classes visit www.snaptutorial.com CCSI 460 Week 2 Current Issues in Digital Forensics

  5. CCSI 460 Believe Possibilities--snaptutorial.com CCMH 535 Week 2 Quiz For more classes visit www.snaptutorial.com 1) Answer the following multiple-choice questions based on your readings for this week. A test was administered to a group of students the morning after homecoming. Several of the students appeared tired and some were coughing and sneezing. These factors may result in what type of error 2) If the reliability coefficient of a test is determined to be .27, what percentage is attributed to random chance or error?27%

  6. CCSI 460 Believe Possibilities--snaptutorial.com CCSI 460 Week 2 Current Issues in Digital Forensics For more classes visit www.snaptutorial.com CCSI 460 Week 2 Current Issues in Digital Forensics

  7. CCSI 460 Believe Possibilities--snaptutorial.com CCSI 460 Week 3 Homework For more classes visit www.snaptutorial.com Week 3 homework Download the picture Doc Sharing called hidden.jpg. Use md5um to get the hash value of the file and size. Download the program steghide.zip from Doc Sharing. You will use this program to hide another picture inside the hidden.jpg image (it’s a command line program so you will need some time working with it).

  8. CCSI 460 Believe Possibilities--snaptutorial.com CCSI 460 Week 3 Lab Report Internet Research For more classes visit www.snaptutorial.com CCSI 460 Week 3 Lab Report Internet Research

  9. CCSI 460 Believe Possibilities--snaptutorial.com CCSI 460 Week 4 Homework For more classes visit www.snaptutorial.com Week 4 homework Analyze the Wireshark packet capture fils called ftp.pcap in Doc Sharing.View the packets and produce a short report including the following. Date and time of transactions Protocol used communicate with server All IPS utilized Usename of connection

  10. CCSI 460 Believe Possibilities--snaptutorial.com CCSI 460 Week 4 Lab Report Hard Drive Image Analysis For more classes visit www.snaptutorial.com Lab Number and Title: Lab4 – Hard Drive Image Analysis Summary of Findings: The source code was exposed by means of criminal activity that Denny Vette was involved in through 1/2/02. There were many items found through the analysis of the hard drive that indicate hacking, steganographic, and cryptographic activities.

  11. CCSI 460 Believe Possibilities--snaptutorial.com CCSI 460 Week 5 Homework For more classes visit www.snaptutorial.com Week 5 homework Stalk yourself or a family member. Pretend that you a cyber stalker and you are going to stalk yourself.

  12. CCSI 460 Believe Possibilities--snaptutorial.com CCSI 460 Week 5 Lab Report Bid ridding and Cyber-Stalking For more classes visit www.snaptutorial.com CCSI 460 Week 5 Lab Report Bid ridding and Cyber-Stalking

  13. CCSI 460 Believe Possibilities--snaptutorial.com CCSI 460 Week 6 Homework For more classes visit www.snaptutorial.com Week 6 homework Mobile Phone Photo Analysis Your client has been accused of a crime. You have take the client’s phone and acquired the image called client.jpg. The hash for the files is:

  14. CCSI 460 Believe Possibilities--snaptutorial.com CCSI 460 Week 7 Course Project Forensic System Image Investigation For more classes visit www.snaptutorial.com CCSI 460 Week 7 Course Project Forensic System Image Investigation

  15. CCSI 460 Believe Possibilities--snaptutorial.com CCSI 460 Week 7 Homework Honeypot Research For more classes visit www.snaptutorial.com CCSI 460 Week 7 Homework Honeypot Research

  16. CCSI 460 Believe Possibilities--snaptutorial.com

More Related