SCI 4201 Practicals
Bethel Chaka N0161068D
May 13, 2020
1
1. A bank has hired your firm to investigate employee fraud. The
bank uses four 20 TB servers on a LAN. You are permitted to talk
to the network administrator, who is familiar with where the data
is stored. What diplomatic strategies should you use? Which ac-
quisition method should you use? Write a two-page report out-
lining the problems you expect to encounter, explaining how to
rectify them, and describing your solution. Be sure to address any
customer privacy issues.
• Solution
As it is mentioned, the investigation is being carried out on the firm’s
employee on which there is a likelihood of involvement in the fraud. The
total server size is 20 TB, and the server information may be accessed by
the investigator. To get the details of all the server files the investigator will
first try to get the server password and username that the investigator can
use to get the details of all the firm’s data. Preparation is very necessary
for the retrieval of the facts in these forms of investigations.
In data acquisition investigator tries to move the file out of the suspect’s
computer or create the file image. The size of the files is often very large
which takes a long time to copy the file. This is a live forensic acquisition
of forensic evidence, since the data obtained is stored on the bank’s sever.
The justification for this is that it can’t be shut down and the explanation
is that bank operates 24 hours a day 7 days a week. Thus, a process should
be followed in the normal way, which is of no disturbance to the banking
related services. Live acquisition is helpful because ram attacks are gone
owing to traces when the system is taken offline or restarted.
Specific tools included in the textbook are different live bootable Linux
CDs such as a sleuth penguin pack, helix, backtrack and more. Such de-
vices are useful, since the CDs used can be booted using the CD / DVD
room. The data stored on the server is easily available, without damag-
ing them. Certain devices are used like DD to view the entire drive or
memfetch to retrieve the volatile RAM memory.
In any case bootable CDs will be used to retrieve the data at the mo-
ment assuming the windows-based server is being used. Backtrack is also
2
one of the most popular because of its numerous built in utilities. Which
range from 300 acquisitions of data to data processing and inhalation of
networks among others. It is safest to use a bootable CD on the suspect’s
device or to access the data from a network drive. Even I would like to use
the same thing though. Later, using the built-in tool such as DD to get the
data on the server.
(Use memfetch to grab the volatile memory on the RAM, too. But, in do-
ing so, please write down the hash values of the data collected to be useful
for future reference). Compare the hash files from separate operating sys-
tem files for windows after this. (DLLS as exes, for example, often compare
data with files to ensure modification duplication.). The forensic image of
the data should be made after this process. Due to privacy concerns you
will need the encryption key to reveal the data. Multiple customers store
the data on the server and thus the procedure has to be followed to protect
the privacy of everybody. (Bank server data is not contained in the simple
text, and is still encrypted.). Also, make sure the data collected is clear,
fast and without phase of device disturbance. That would give you the
reasons enough to find the culprit, though.