LAB8 - Digital Forensics Technology and Practices - WORKSHEET2
LAB8 - Digital Forensics Technology and Practices - WORKSHEET2
Table of Contents
Introduction...............................................................................................................................................................2
Screenshot 1 – Creation of Yourname.TXT file...........................................................................................................3
Screenshot 2 – Finding the File Type of the Yourname.TXT file.................................................................................4
Screenshot 3 – Finding the File Type of the Yourname file........................................................................................5
Screenshot 4 – Creation of Yourname.exe file...........................................................................................................6
Screenshot 5 – Get the Hash of the Yourname.exe File.............................................................................................7
Screenshot 6 – Identify the File Type of Yourname.exe.............................................................................................8
Screenshot 7 – Getting the strings of the Yourname.exe File....................................................................................9
Screenshot 8 – Creating Yourname.exe Malware....................................................................................................10
Screenshot 9– Finding the File Type of the Yourname file with .Doc Extension......................................................11
Screenshot 10– Use Virustotal to Analyze Yourname file with .Doc Extension........................................................12
Conclusion...............................................................................................................................................................13
APA References........................................................................................................................................................14
1
Introduction
Students: In the box below, please explain the purpose of doing this lab below and explain
how it is relevant to Computer Forensics.
Introduction
Malware analysis is a crucial aspect of digital forensics, allowing investigators to detect, classify, and analyze
malicious files to understand their behavior and impact. The objective of this lab was to explore file examination
and malware creation techniques using tools in Kali Linux. By analyzing file types, extracting metadata,
generating hashes, and using detection tools like VirusTotal, we gained insights into how digital forensic
experts investigate suspicious files.
This lab is highly relevant to Digital Forensics Technology and Practices because malware investigations are a
key part of cybersecurity incident response and threat intelligence. We used Linux command-line utilities such
as file, md5sum, strings, and msfvenom to manipulate and analyze executable files. Additionally, we explored
how attackers disguise malware by renaming and altering file extensions. These skills are essential for detecting
and mitigating malware threats in enterprise security and law enforcement investigations.
2
Screenshot 1 – Creation of Yourname.TXT file
1. Create a file at the terminal that says hello world and send the output of the file to yourname.txt,
where yourname is your first name. Take a screenshot of sending hello world to your file. The use of
anyone else’s name may result in an academic integrity review by your professor. Please label your
screenshot to receive full credit.
3
Screenshot 2 – Finding the File Type of the Yourname.TXT file
2. Use the file command in Linux to identify the file type of the yourname.txt file, where yourname is
your first name. The use of anyone else’s name may result in an academic integrity review by your
professor. Please label your screenshot to receive full credit.
Take a screenshot of using the File Command on the Your Name Text File
4
Screenshot 3 – Finding the File Type of the Yourname file (no Extension)
3. Use the file command in Linux to identify the file type of the yourname file, where yourname is your
first name. The use of anyone else’s name may result in an academic integrity review by your
professor. Please label your screenshot to receive full credit.
Take a screenshot of using the File Command on the Your Name Text File
5
Screenshot 4 – Creation of Yourname.exe file
4. Copy nc.exe to yourname.exe, where yourname is your first name. Take a screenshot of listing the
files and folders, including yourname.exe. The use of anyone else’s name may result in an academic
integrity review by your professor. Please label your screenshot to receive full credit.
6
Screenshot 5 – Get the Hash of the Yourname.exe File
5. Use the md5sum command at the terminal to get the hash of the yourname.exe file. The use of
anyone else’s name may result in an academic integrity review by your professor. Please label your
screenshot to receive full credit.
Take a screenshot of using the md5sum command to get the hash of the Yourname. EXE File
Fig 5: Screenshot of using md5sum command to get the hash of the Beatrice.exe
7
Screenshot 6 – Identify the File Type of Yourname.exe
6. Use the file command at the terminal to identify the file type of the yourname.exe file. The use of
anyone else’s name may result in an academic integrity review by your professor. Please label your
screenshot to receive full credit.
Take a screenshot of using the File Command to Identify the Your Name. EXE File
8
Screenshot 7 – Getting the strings of the Yourname.exe File
7. Use the strings command at the terminal to get information about the contents of the
yourname.exe file. The use of anyone else’s name may result in an academic integrity review by
your professor. Please label your screenshot to receive full credit.
Take a screenshot of using the Strings Command to get information about the Your Name. EXE File
Fig7: Screenshot of using the Strings Command to get information about Beatrice.exe
file
9
Screenshot 8 – Creating Yourname.exe Malware
8. Use the msfvenom command at the terminal to create malware called yourname.exe. The use of
anyone else’s name may result in an academic integrity review by your professor. Please label your
screenshot to receive full credit.
Take a screenshot of using the msfvenom Command to get create the Your Name. EXE File
Fig8: Screenshot of using the msfvenon command to get create the Beatrice.exe file
10
Screenshot 9– Finding the File Type of the Yourname file with .Doc Extension
9. Use the file command in Linux to identify the file type of the yourname file with a .doc extension,
where yourname is your first name. The use of anyone else’s name may result in an academic
integrity review by your professor. Please label your screenshot to receive full credit.
Take a screenshot of using the File Command on the Your Name File with the .Doc Extension
11
Screenshot 10– Use Virustotal to Analyze Yourname file with .Doc Extension
10. Use the virustotal website to analyze the yourname file with a .doc extension, where yourname is
your first name. The use of anyone else’s name may result in an academic integrity review by your
professor. Please label your screenshot to receive full credit.
Take a screenshot of the using virustotal on the Your Name File with the .Doc Extension
12
Conclusion
Students: In the box below, please explain the purpose of doing this lab below and explain
how in is relevant to Digital Forensics Technology and Practices. Highlight any new learning
that occurred while doing this lab.
Hint: Discuss tools and commands used in the lab.
Conclusion
This lab provided hands-on experience in malware analysis and forensic techniques, highlighting how malicious
files can be identified, manipulated, and investigated. By using file identification tools, hashing algorithms, and
online scanning services like VirusTotal, we were able to analyze the properties of executable files and detect
signs of malware. We also learned how cybercriminals disguise malware by changing file extensions, making it
more challenging for traditional antivirus solutions to detect threats.
The practical experience gained in this lab reinforces the importance of digital forensics in cybersecurity
investigations. Understanding how malware operates and how to detect it is crucial for forensic analysts,
cybersecurity professionals, and incident responders. This knowledge helps organizations defend against cyber
threats by identifying malicious files, preventing infections, and improving threat intelligence.
13
APA References
2. Cybersecurity & Infrastructure Security Agency (CISA). (n.d.). VirusTotal and malware analysis tools.
Retrieved from https://www.cisa.gov/resources-tools/services/virustotal
3. Razak, M. F. A., Anuar, N. B., Salleh, R., & Firdaus, A. (2016). The rise of “malware”: Bibliometric
analysis of malware study. Journal of Network and Computer Applications, 75, 58–76.
https://doi.org/10.1016/j.jnca.2016.08.022
14