Hashing

Submit a report describing their forensics process and include any necessary screen shots or report to support this and to answer questions related to the scenario.  

ECA137 – Computer Crime & Investigation   Objective: The student is supplied with a device image, and they will need to image the image file, validate the image, mount the image file, and examine the image to determine its  contents. The student should identify the file that corresponds with the supplied file  hash and examine […]

Scroll to top