Evidence File: Download from here
Answer the following questions:
Questions
- Which memory profile best fits the system?
- The user had a conversation with themselves about changing their password. What was the password they were contemplating changing too. Provide the answer as a text string.
- What is the md5 hash of the file which you recovered the password from?
- What is the birth object ID for the file which contained the password?
- What is the name of the user and their unique identifier which you can attribute the creation of the file document to? Format: #### (Name)
- What is the version of software used to create the file containing the password?
- What is the version of software used to create the file containing the password?
- What is the virtual memory address offset where the password string is located in the memory image?
- What is the physical memory address offset where the password string is located in the memory image?
- At the time of the RAM collection (20-Apr-20 23:23:26- Imageinfo) there was an established connection to a Google Server. What was the Remote IP address and port number? format: “xxx.xxx.xx.xxx:xxx”
- What was the Local IP address and port number? same format as part 1
- What was the URL?
- What user was responsible for this activity based on the profile?
- How long was this user looking at this browser with this version of Chrome? format: X:XX:XX.XXXXX Hint: down to the last second
- What is the IPv4 address that myaccount.google.com resolves to?
- What is the canonical name (cname) associated with Part 1?
- What is the PID of the application where you might learn “how hackers hack, and how to stop them”? Format: #### Warning: Only 1 attempt allowed!
- What is the product version of the application from Part 1? Format: XX.XX.XXXX.XXXXX