Question
i really need help with this please. i don't understand anything about this. can someone solve this case for me please. ONLY the file with
i really need help with this please. i don't understand anything about this. can someone solve this case for me please.
ONLY the file with JO should be worked on rest don't need to.
Part 2: Exfiltration of corporate intellectual property
Your task is to investigate this case including facts from any contents you found and report your finding.
Please note that in the Case 6 data case: "when the police receive information from an individual outside of m57.biz that purchased a laptop from Craigslist. The laptop the individual purchased contains child pornography and decided to inform the police of the incident". In the data case, all the child pornography images are cat/kitten photos.
Forensic tools: use Autopsy and/or Winhex for your investigation
Question 2: Image: The main players are the CEO, Pat McGoo; the IT person, Terry; and the patent researchers, Jo and Charlie You are tasked with determining the following: Questions to answer: You have been given the "Police Evidence" set of data includes the following: HARD DRIVES charlie-2009-12-11.E01 jo-2009-12-11-002.E01 pat-2009-12-11.E01 terry-2009-12-11-002.E01 RAM charlie-2009-12-11.mddramimage.zip jo-2009-12-11.mddramimage.zip pat-2009-12-11.mddramimage.zip terry-2009-12-11.mddramimage.zip USB charlie-work-usb-2009-12-11.E01 jo-work-usb-2009-12-11.E01 terry-work-usb-2009-12-11.E01 jo-favorites-usb-2009-12-11.E01 Note: only JO file is what i need for this task. Investigating criminal activity The M57 Patents Case within m57.biz Part 2: Exfiltration of corporate intellectual property M57.biz is a new company that researches patent information for clients. dotBlz Facts of the case: - 1 president / CEO - 3 additional employees - The firm is planning to hire more employees, so they have a lot of inventory on hand (computers, printers, etc). Current employees: - President: Pat McGoo - Information Technology: Terry - Patent Researchers: Jo, Charlie Employees work onsite, and conduct most business exchanges over email. All of the employees work in Windows environments, although each employee prefers different software (e.g. Outlook vs. Thunderbird). Note: In the above figure "DOMEX" is the local server managing external network access and email. The case: exfiltration of corporate IP One of the employees in M57 is stealing proprietary research from the company and passing it on to an outside entity. This employee has taken some measures to cover their tracks, but probably did not count on the company machines being imaged in the ongoing investigation of other criminal activity. You are tasked with determining the following: - Who is exfiltrating the data? - How are they doing it? Can you identify the specific items they have stolen? What is required to access the data? - Who is the outside contact? - Is there anything in your analysis to suggest that this person might be charged with more than one criminal offense? Electronic identities N 7 Pat McGoo (President): - pat@m57.biz (email password: mcgoo01) Terry Johnson (IT Administrator): - terry@m57.biz (email password: johnson01) Jo Smith (Patent Researcher): - jo@m57.biz (email password: smith01) Charlie Brown (Patent Researcher): - charlie@m57.biz (email password: brown01) You have been given the "Police Evidence" set of data includes the following: - Hard drive images from all workstations in the office: - charlie-2009-12-11.E01, jo-2009-12-11-002.E01, pat-2009-12-11.E01, terry-2009-12-11-002.E01 - (Optional) RAM dumps from the machines taken during the police visit (mdd or windd images): - charlie-2009-12-11.mddramimage.zip, jo-2009-12-11.mddramimage.zip, pat-2009-12-11.mddramimage.zip, terry-2009-12-11.mddramimage.zip - Three company USB drives found on-premises and one personal USB drive seized from Jo: - charlie-work-usb-2009-12-11.E01, jo-work-usb-2009-12-11.E01, terry-workusb-2009-12-11.E01 - jo-favorites-usb-2009-12-11.E01 Use EnCase to examine the M57 Patents disk images. - Most of EnCase features can be used on these images. - They are big enough to be realistic, small enough so that the EnCase functionality will run in 5-30 minutes depending on the image being examined. Try using FTK or SleuthKit to compare functionality. Note: Terry's phone is not available in the corpus. However, several files that originated from the phone exist somewhere in the corpus. Can you find them? Are they related to the case
Step by Step Solution
There are 3 Steps involved in it
Step: 1
Get Instant Access to Expert-Tailored Solutions
See step-by-step solutions with expert insights and AI powered tools for academic success
Step: 2
Step: 3
Ace Your Homework with AI
Get the answers you need in no time with our AI-driven, step-by-step assistance
Get Started