Purpose In this assignment, you will examine an HKCU hive for evidence of unauth

Do you need this or any other assignment done for you from scratch?
We have qualified writers to help you.
We assure you a quality paper that is 100% free from plagiarism and AI.
You can choose either format of your choice ( Apa, Mla, Havard, Chicago, or any other)

NB: We do not resell your papers. Upon ordering, we do an original paper exclusively for you.

NB: All your data is kept safe from the public.

Click Here To Order Now!

Purpose
In this assignment, you will examine an HKCU hive for evidence of unauth

Purpose
In this assignment, you will examine an HKCU hive for evidence of unauthorized access. Read the scenario carefully, as you may consider it interview notes with your client. This is often one of the first real examination tasks you’re likely to encounter and will be a test of your ability to make inferences, be thorough in your search, and document your examination.
Instructions
You’ll need to use the following resources to complete the assignment:
Investigation 01 Sample Evidence located in the Virtual Lab
A registry analysis tool, such as Registry Explorer by Eric Zimmerman located in the Virtual Lab
After reading the Investigation 01 scenario, open your forensic tool and import the sample evidence into the tool. Begin a forensic report and begin your search. As you do, be sure to take special note of these answers to these questions. These questions represent those that need to be answered to arrive at a logical conclusion to this scenario. They are provided here, but in the future, you will be required to decide these questions on your own.
Scenario
This scenario takes place circa 2012. You were recently contacted by Nick Fury of S.H.I.E.L.D. to investigate a suspected corporate espionage incident. They have reason to believe that S.H.I.E.L.D. was infiltrated by an enemy spy who used the generic vibranium account to access and exfiltrated sensitive information from an endpoint connected to the SHIELD network with the hostname of nromanoff. Nick Fury believes that the culprit may be a recently terminated employee named Jim Tandy. Jim was recently fired under suspicion of leaking confidential information to Hydra. Your job will be to examine the NTUSER.DAT file containing the HKCU registry hive for the vibranium user to determine the answers to the following questions.
Questions
What was the most recent keyword that the user vibranium searched using Windows Search for on the nromanoff system?
How many times did the vibranium account run excel.exe on the nromanoff system?
When was this program last run?
What is the most recent Typed URL in the vibranium NTUSER.DAT?
List the last five files that were accessed, in order, with the time they were accessed.
Format
You can submit your forensic report in Adobe PDF format. It should be a complete report. A template has been provided if you need help, but be aware that not all sections shown in the template will be relevant to this investigation:
Upload one file (PDF),
Your forensic report should include a cover page and a page dedicated to answering the accompanying questions at the end,
You may include screenshots or other evidence to support your conclusions, but a screenshot is not a shortcut to a complete report,
Grading and Submission
In brief, I’ll be evaluating you on the following for your first submission.
Forensic Reporting

The report is complete and contains only truth.

Examination Process

Your examination is fully documented and uses accepted practices.

Identifying Evidence

While you are not expected to find every relevant evidence item, you should discover enough to adequately support the conclusions in your report.

Do you need this or any other assignment done for you from scratch?
We have qualified writers to help you.
We assure you a quality paper that is 100% free from plagiarism and AI.
You can choose either format of your choice ( Apa, Mla, Havard, Chicago, or any other)

NB: We do not resell your papers. Upon ordering, we do an original paper exclusively for you.

NB: All your data is kept safe from the public.

Click Here To Order Now!

Place this order or similar order and get an amazing discount. USE Discount code “GET20” for 20% discount