Professional Documents
Culture Documents
SUBMITTED TO
I am Sanchit Chauhan (Investigator) 12009265, here by declare that the work done by me
University , Phagwara, Punjab, is a record of original work for the partial fulfillment of the
Investigator Name
Sanchit Chauhan
(120092652)
2
Acknowledgment
The Case opportunity we had with the Investigator Officer (Head) was a great chance for
learning and cyber forensics investigation. This is a Cyber Forensics Therefore, I consider
myself as a very lucky individual as I was provided with an opportunity to be a part of this
Case. I am also grateful for having a chance to learn from the Investigation who led me
through this First Investigation. I express my deepest thanks to Investigator Officer (Head)
Dr. Yasir Afaq School of Computer Application, Lovely Professional University for allowing
learning experience.
Investigator Name
Sanchit Chauhan
(12009265)
3
Case Study-1: Investigating an Child Pornography Case:
case where several digital devices have been collected as evidence. In order to properly
investigate this case, we require that you use the EWFTOOL KIT. We know that this is an
important responsibility and we trust in your skills and expertise to get the job done. If you
have any questions or need any assistance in using the EWFTOOL KIT, please do not
hesitate to reach.
Steps to perform :
● First we need to extract the source file path and then we need to provide some
4
● After creating the image of the suspected file we also need to check the integrity of
5
● Here we are creating the different format of the original image file we create
6
● Here are the different format files stored in the system directory.
We are writing to inform you of a breach of data that has occurred at our software-based
company in Noida . The complainant has reported that some of our employees have used
the company hard drive to leak crucial information to outsiders. It is imperative that we
investigate this matter fully and as soon as possible. Therefore, we would like to request
are confident that with your experience and skill, you will be able to uncover any evidence
of wrongdoing and help us take the necessary steps toward rectifying the situation.
Steps to perform :
● Firstly we are going to use the FTK tool for both data acquisition and data analysis.
So we will add the source file and provide the additional information and
7
● Now we provide the description and some of the additional information on the case
8
● Now we also provide the image formats , compression level and other type of
● Now by adding the evidence items we can check the data in a hierarchical manner.
9
● We get the different files with extension AD1, hash.csv and exported contents within
10
11
12