
Digital Forensics
Mock Forensics investigation

Investigation of a Windows Disk Image:
- Carried out integrity checks through hashing to ensure that the image remained unchanged.
- Investigated using Autopsy to identify any files of interest within the image.
- Carried out manual file carving of hidden files within the disc image.
- Documented investigation through contemporaneous notes.
- Identified accounts of interest regarding the investigation.
- Followed timelines of events carried out, including the deletion of files.
- Identify the use of tools attempting to manipulate evidence, such as modifying the files creation time.
- Identify information. from metadata that assists with the investigation, such as location data.
- Identify evidence of manipulation of image data and hiding of information.
- Recovering data hidden through steganography.
- Follow a timeline of behaviours by the user in the time of the incident.
- Identify what external devices and network connections were used within the incident.