100% found this document useful (1 vote)
676 views2 pages

Cyber Crime Investigation & Digital Forensics Lab

Uploaded by

Hema boyapati
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
100% found this document useful (1 vote)
676 views2 pages

Cyber Crime Investigation & Digital Forensics Lab

Uploaded by

Hema boyapati
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 2

R18B.Tech .

CSE (Cyber Security) I II& IV Year JNTU Hyderabad

CYBER CRIME INVESTIGATION & DIGITAL FORENSICS LAB

B.Tech. III Year II Sem.

List of Experiments:-

1. Perform email analysis using the tools like Exchange EDB viewer, MBOX viewer and View
user mail boxes and public folders, Filter the mailbox data based on various criteria, Search
for particular items in user mailboxes and public folders

Software/Tools Required:
1. Microsoft Exchange Server
2. EDB Viewer
3. MBOX Viewer

2. Perform Browser history analysis and get the downloaded content, history, saved logins,
searches, websites visited etc using Foxton Forensics tool, Dumpzilla.

Software/Tools Required:
1. Foxton Forensics tool.
2. Dumpzilla
3. Kali-Linux

3. Perform mobile analysis in the form of retrieving call logs, SMS log, all contacts list using
the forensics tool like SAFT

Software/Tools Required:
1. SAFT Forensics tool.

4. Perform Registry analysis and get boot time logging using process monitor tool

Software/Tools Required:
1. Microsoft Process Monitor tool.

5. Perform Disk imaging and cloning the using the X-way Forensics tools

Software/Tools Required:
1. X-Way Forensics Tool

6. Perform Data Analysis i.e History about open file and folder, and view folder actions using
Last view activity tool

Software/Tools Required:
1. Last View Activity Tool

7. Perform Network analysis using the Network Miner tool.

Software/Tools Required:
1. Network Miner Tool

8. Perform information for incident response using the crowd Response tool

Software/Tools Required:
1. Crowd Response Tool
9. Perform File type detection using Autopsy tool

Software/Tools Required:
1. Autopsy Software

10. Perform Memory capture and analys is using the Live RAM capture or any forensic tool

Software/Tools Required:
1. Volatility Tool
2. Python Latest Version

You might also like