Professional Documents
Culture Documents
Jeet Bangoria 1st Feb 2022 Jayakumar S - 19BCE0874: Digital Forensic Lab - Submission Date: Submitted To: Reg. No
Jeet Bangoria 1st Feb 2022 Jayakumar S - 19BCE0874: Digital Forensic Lab - Submission Date: Submitted To: Reg. No
LAB ASSIGNMENT -1
AIM:
The aim of this experiment is to analyze, identify and prepare a Forensics Report based on the given files of
Mantooth.E01 and Washer.E01
MANTOOTH:
The operating system used in the computer was windows vista™ ultimate with 32 bit processor
3) What is the File System?
The file System used was NTFS/exFAT + DOS FAT12 (4 partitions, 2 unallocated)
4) Provide the account name and last login information for each account present in Mantooth
There were various users including the guest and administrator of the system which included users with
username Laurent,Dracula,Wes Mantooth
There are 4 .exe files found in recycle bin namely $RTHDU55.exe , $R61QDFF.exe ,$ITHDU55.exe and
$I61QDFF.exe
$RTHDU55.exe and $ITHDU55.exe were deleted exe files for FileZilla_2_2_32_setup.exe
And
$R61QDFF.exe and $I61QDFF.exe were deleted exe files for CameraShy.exe
A message with Gladiator was found in past messages also the terms and agreement were found in stuffs
that corresponds with link to gladiator
7) What is a "Pranic Vampire"? In which document is it mentioned? When was the document created?
“Pranic Vampire” is a term used for psychic vampire and means “life energy” in Sanskrit. This is mentioned in 3
documents:
It is a video, of a security camera, in which shows a frustrated person working on computer gets who suddenly
starts breaking the monitor and crashing the keyboard which is witnesses by his colleague as well.
Fig 11:Happy.mpeg
10) Find the list of criminal activities Mantooth was involved in and the associated artifacts.
Downloaded html files having drug images and some having content on how to make some types of drugs depict
that he wanted to make drugs
He tried to steal ATM IDs of people which was found in some files that he tried to search about, in addition to that he
also tried to steal car
He also has documents regarding how to get away from stealing a car, along with the US rules and regulations for such
breach.
His Browser history having the preparation of drugs depicts he was indeed preparing
The fact that he has child exploitation with various severities somehow indicates he was planning to start a trafficking
racket, which can’t be deduced without proper proof.
12) Mantooth received one Text Internet Email that had no subject about a stolen ATM. Who sent it to him
(name and email) and when was it sent?
1) What is the starting sector of Partition 2 and what is the size of it?
Starting sector of partition 2 is 63 and the size of the partition is 120,456 KB.
a. The Wolf
b. Mr Smee
c. Guest
d. Captain Hook
e. Billy Bob Burbeck
f. Artimus
g. Administrator
Fig 18: Names of the users
Yes , Washer and Mantooth knew each other .We can clearly see it by analyzing their by their email chat .
5) How many .doc files are there? Extract all, document what is their content and their md5 values
John Washer, Mantooth and Rasco Badguy were involved in the discussion about “Special K”
CONCLUSION
Hence from this experiment we were able is to analyze, identify and prepare a Forensics Report based
on the given files of Mantooth.E01 and Washer.E01