Docsity
Docsity

Prepare for your exams
Prepare for your exams

Study with the several resources on Docsity


Earn points to download
Earn points to download

Earn points by helping other students or get them with a premium plan


Guidelines and tips
Guidelines and tips

Applying the Daubert Standard to Forensic Evidence, Study Guides, Projects, Research of Digital Electronics

A lab exercise from the digital forensics, investigation, and response, fourth edition textbook. It focuses on applying the daubert standard to forensic evidence, which is a legal standard used to evaluate the admissibility of expert witness testimony in the united states. The lab covers various aspects of digital forensics, including chain of custody procedures, extracting and verifying hash codes of evidence files using different tools (ftk imager, autopsy, and e3), and verifying hash codes on the command line. The lab also includes a challenge and analysis section where students are asked to define the original file names and file paths for additional evidence. This lab would be useful for students studying digital forensics, criminal justice, or law, as it provides hands-on experience with the daubert standard and digital forensic techniques.

Typology: Study Guides, Projects, Research

2023/2024

Uploaded on 05/08/2024

taylor-giguere
taylor-giguere 🇺🇸

1 document

1 / 12

Toggle sidebar

This page cannot be seen from the preview

Don't miss anything!

bg1
Applying the Daubert Standard to Forensic Evidence (4e)
Digital Forensics, Investigation, and Response, Fourth Edition - Lab 01
Student: Email:
Taylor Giguere tgiguere931@anselm.edu
Time on Task: Progress:
88%
Report Generated: Thursday, February 8, 2024 at 3:39 PM
Section 1: Hands-On Demonstration
Part 1: Complete Chain of Custody Procedures
7. Make a screen capture showing the contents of the search warrant in Adobe Reader.
Page 1 of 12
pf3
pf4
pf5
pf8
pf9
pfa

Partial preview of the text

Download Applying the Daubert Standard to Forensic Evidence and more Study Guides, Projects, Research Digital Electronics in PDF only on Docsity!

Digital Forensics, Investigation, and Response, Fourth Edition - Lab 01

Student: Email: Taylor Giguere tgiguere931@anselm.edu

Time on Task: Progress: 88%

Report Generated: Thursday, February 8, 2024 at 3:39 PM

Section 1: Hands-On Demonstration

Part 1: Complete Chain of Custody Procedures

  1. Make a screen capture showing the contents of the search warrant in Adobe Reader.

Digital Forensics, Investigation, and Response, Fourth Edition - Lab 01

  1. Make a screen capture showing the completed Chain of Custody form in Adobe Reader.

Part 2: Extract Evidence Files and Create Hash Codes with FTK Imager

Digital Forensics, Investigation, and Response, Fourth Edition - Lab 01

  1. Make a screen capture showing the contents of the MyRussianMafiaBuddies_hash.csv file.

Digital Forensics, Investigation, and Response, Fourth Edition - Lab 01

  1. Make a screen capture showing the contents of the Nice guys_hash.csv file.

Part 3: Verify Hash Codes with E

Digital Forensics, Investigation, and Response, Fourth Edition - Lab 01

  1. Make a screen capture showing the MD5 and SHA1 values for the Nice Guys.png file.
  2. Describe how the hash values produced by E3 for the incriminating files compare to those produced by FTK. Do they match?

Yes, the has values that were produced by E3 is the same hash had produced by FTK.

Digital Forensics, Investigation, and Response, Fourth Edition - Lab 01

Section 2: Applied Learning

Part 1: Extract Evidence Files and Create Hash Codes with FTK Imager

  1. Make a screen capture showing the contents of the suspicious email file in the Display pane.

Digital Forensics, Investigation, and Response, Fourth Edition - Lab 01

  1. Make a screen capture showing the MD5 field in the Result Viewer.
  2. Describe how the hash value produced by Autopsy compares to the values produced by FTK Imager for the two .eml files.

It is the same.

Part 3: Verify Hash Codes with E

Digital Forensics, Investigation, and Response, Fourth Edition - Lab 01

  1. Make a screen capture showing the MD5 value produced by E.
  2. Describe how the hash value produced by E3 compares to the values produced by FTK Imager for the two .eml files and the value produced by Autopsy.

The hash value that is produced by E3 and by FTK for the two .eml files are the same.