COMP6445 -无代写
时间:2025-10-29
UNSW COMP6445
Student: z5678whodoweappreciate
Name: John Citizen
m57biz Forensic
Investigation
/r/ma
sterh
acker
Contents
Contents
Preliminaries ............................................................................................................................................................... 1
Case Summary .......................................................................................................................................................... 1
Declaration .................................................................................................................................................................. 2
Assumptions & Limitations ....................................................................................................................................... 3
Background ................................................................................................................................................................ 4
Forensic Preparation ................................................................................................................................................. 5
Questions .................................................................................................................................................................... 6
Q1 - [… an employee is defrauding the company] Is there any evidence to support this? ....................... 6
Conclusion .................................................................................................................................................................. 9
Appendix .................................................................................................................................................................. 10
0. Seizure to Acquisition Time Discrepancy .............................................................................................. 10
1. ExifTool analysis of ABCTech Receipts ................................................................................................. 11
2. Timeline ....................................................................................................................................................... 12

Page 1 of 17
Preliminaries
1. I am a digital forensics investigator at Jim's Cyber Forensics Consulting.
2. I have been an intern for 5 weeks
3. this report made sense to me when I wrote it
4. trust me, I am a master hacker bc I use kali

Case Summary
This report covers the investigation of a fictitious company m57biz over a 17-day period from Monday 16th
November 2009 to Friday 11th December 2009. Pat McGoo (CEO) of m57biz has suspected that an
employee is defrauding the company and has reached out to Jim's Cyber Forensics Consulting to
investigate this claim. In this report, disk images of company machines and removable storage mediums
belonging to employees will be forensically analysed to draw remarks pertaining the validity of this claim.
The investigation observes four potential cases of misconduct that fall under either civil or criminal law.
1. Selling of company property for personal gain
2. Selling of company secrets
3. Blackmail with malicious intent
4. Unauthorised monitoring / surveillance

Page 2 of 17
Declaration
1. I have read and understood the Uniform Civil Procedure Rules 2005 - Schedule 7 - Expert Witness
Code of Conduct and agree to be bound by its terms.
2. My opinions expressed in this report are based wholly or substantially on my specialised knowledge
referred to in this report.
3. I have made all enquires that I believe are desirable and appropriate and no matters of significance
which I regard as relevant have, to my knowledge, been withheld in this report
4. All outcomes drawn during this investigation were obtained solely from the forensic analysis of the
artifacts provided, and are not to be copied or used out of the context of this investigation
5. Good faith policy or something..?

Page 3 of 17
Assumptions &
Limitations
It should be noted that we (Jim's Cyber Forensics Consulting) were not responsible for the acquisition of
the disk images that were forensically analysed, but rather were supplied with disk images. Consequently,
it is possible that the image acquisition process may have compromised the integrity of the source. Whilst
the authenticity of the received disk images is beyond our control, utmost care and precaution was taken
to continually preserve the integrity of the received disk images.
Whilst the disks from company machines and removable storage mediums were physically seized on 11th
December 2009, images were only obtained in early 2011 (Dating 13th Jan to 20th Feb) – see Appendix 0).
It is not confirmed as to whether the integrity of the source was compromised during this period of delay.
It will be assumed that the disk images exactly match the contents of the devices at the time of seizure in
2009 and will be considered to be verified copies that were acquired with forensically sound processes.
During the investigation, results and applications outputs were cross-checked between different software
to establish forensic soundness within the investigative processes. Whilst it is possible that all utilised tools
produce invalid results or fail to produce any result, it is however extremely unlikely.
We assume the definition of “defraud” from the Cambridge Dictionary1 under the following meaning:
“to take something illegally from a person, company, etc., or to prevent someone
from having something that is legally theirs by deceiving them”


1 https://dictionary.cambridge.org/dictionary/english/defraud
Page 4 of 17
Background
• This is the computer background

• m57biz is a patent search company – which provides the service of verifying if a client’s idea or
prospective design has already been patented.
• The company started business on Monday 16th November 2009, with 4 employees
o Pat McGoo – CEO
o Terry Johnson – IT Administrator
o Jo Smith – Patent Researcher
o Charlie Brown - Patent Researcher
• The company is based in California, given the phone number area code prefix of 831
• It should be noted that in 2009, the approximate cost of hard disk storage was US$0.09/GB2, and
the approximate cost of flash storage was US$2.26/GB3




2 https://jcmit.net/diskprice.htm
3 https://jcmit.net/flashprice.htm
Page 5 of 17

Forensic Preparation
The following disk images were received as part of this investigation and were verified against their
expected MD5 checksums. A checksum is a mathematically computed value generated from the contents
of a file to ensure the integrity of the file. If the generated checksum of a file matches the reference
checksum, then it is assumed that the file has not been modified or tampered with when compared to the
reference file.
Filename MD5 Checksum
charlie-2009-12-11.E01 a459f1aa45941ad4fa22d5cb9d35f7fc
charlie-work-usb-2009-12-11.E01 8c23941655b3313f4a31a1a66085be86
pat-2009-12-11.E01 ccea8df1463b2adc8a9b6c8ab9563675
terry-2009-12-11-002.E01 cf383e86dc37d4d70c9ad1ce987b61be
terry-work-usb-2009-12-11.E01 941997b1b9e7a1217351d483c12dc29b

These verified copies contain a complete dump of the disk / drive, which is inclusive of all active and
deleted files, in addition to any artifacts found in the unused / unallocated space.
Unless otherwise stated, the timestamps in this report will be relative to US Pacific Standard Time (PST),
which is UTC -8.

Page 6 of 17
Questions
Q1 - [… an employee is defrauding the company] Is there any evidence to support this?
If so, what is the evidence?
Table 1 - Hard Drive Receipt

Receipt A Receipt B


File ABCTECH_RECEIPT.jpg ABCTECH_RECEIPT_pat.jpg
Path
[Inbox]
5815441D-00000027.eml
[Sent Items]
6DF15AF1-00000002.eml
Send/Recv
RECV
19/11/09 11:28:27 (GMT -08:00)
SEND
19/11/09 13:04:10 (GMT -08:00)
MD5 51a72bf38097a5fbd08ecc283e6f9c44 101880370d00ba48a1e0b7b93460a9a9

Upon analysis of the acquired disks, evidence was found in support of the claim that an employee is
defrauding the company. As demonstrated in Table 1, an extraction of Terry’s computer (terry-work-2009-
12-11.E01) revealed two emails with attachments of a similar store receipt, each listing a “40GB HDD” line
item. Receipt A (ABCTECH_RECEIPT.jpg) prices the storage medium at US$2.50/GB, whilst Receipt B
(ABCTECH_RECEIPT_pat.jpg) prices the device at US$7.50/GB.
In 2009, the cost per gigabyte for storage was US$0.09/GB for mechanical hard disks, and US$2.26/GB
for flash storage. Whilst Receipt A is possibly valid despite the higher cost per gigabyte, it is unreasonable
to consider Receipt B as legitimate given the tripled cost per gigabyte as compared to 2009 storage prices.

Page 8 of 17
Figure 3 - Terry's Craigslist Listings


Figure 3 illustrates the Autopsy5 forensic analysis tool (v4.19.3) having extracted Craigslist emails
regarding successful postings of sales classifieds that include a ‘Dell 17” Monitor’ and ‘Dell Computer’
(posted 25th November 2009). Having replaced Jo’s corporate computer on 20th November 2009 with the
premise of diagnosing and repairing an issue (See Attachment Error! Reference source not found.),
suspicion is raised concerning the timeliness of sequentially acquiring a computer, listing a computer as
for sale and then requesting new equipment.
Given the nature of Terry’s role as an IT administrator, there is an expectancy for Terry to be able to
manage the IT inventory wisely and to possess the technical competency to repurpose a spare computer
into a ‘server’ computer. The selling of a monitor and computer is suspicious, given the request to acquire
the same type of equipment - the sequence of events suggest that Terry is attempting to sell the company
computer (and other assets) for personal gain. Whilst it is possible that the computer and monitor for sale
was not the same computer and monitor taken in for repair, the identicality of their brands support the
suspicion.
Given strong evidence of receipt tampering, we conclude that Terry has attempted to defraud the
company by submitting a tampered reimbursement claim. We additionally believe that Terry has attempted
to sell off company equipment for personal benefit.
* redacted content *


5 https://www.sleuthkit.org/autopsy
Page 9 of 17
Conclusion
We conclude by agreeing with the claim that an employee has been
defrauding the m57biz company, and draw evidence that suggests Terry
as the culprit. Furthermore, our forensic analysis concludes that there is
indeed evidence illegal or fraudulent activity performed by both Charlie
and Terry, separately.


Page 10 of 17
Appendix
0. Seizure to Acquisition Time Discrepancy


Page 11 of 17
1. ExifTool analysis of ABCTech Receipts
Metatag Receipt A Receipt B
JFIF Version 1.01 1.01
Profile CMM Type Apple Computer Inc. Apple Computer Inc.
Profile Version 2.2.0 2.2.0
Profile Class Display Device Profile Display Device Profile
Color Space Data RGB RGB
Profile Connection Space XYZ XYZ
Profile Date Time 2009:02:25 11:26:11 2009:02:25 11:26:11
Profile File Signature acsp acsp
Primary Platform Apple Computer Inc. Apple Computer Inc.
CMM Flags Not Embedded, Independent Not Embedded, Independent
Device Manufacturer Apple Computer Inc. Apple Computer Inc.
Device Attributes Reflective, Glossy, Positive, Color Reflective, Glossy, Positive, Color
Rendering Intent Perceptual Perceptual
Connection Space
Illuminant
0.9642 1 0.82491 0.9642 1 0.82491
Profile Creator Apple Computer Inc. Apple Computer Inc.
Profile ID 0 0
Profile Description Generic RGB Profile Generic RGB Profile
Green Matrix Column 0.35335 0.67363 0.09064 0.35335 0.67363 0.09064
Media White Point 0.95047 1 1.0891 0.95047 1 1.0891
Red Matrix Column 0.4543 0.24191 0.01489 0.4543 0.24191 0.01489
Blue Matrix Column 0.15665 0.08446 0.71957 0.15665 0.08446 0.71957
Profile Copyright
Copyright 2007 Apple Inc., all
rights reserved.
Copyright 2007 Apple Inc., all
rights reserved.
Chromatic Adaptation
1.04788 0.02292 -0.0502 0.02957
0.99049 -0.01706 -0.00923
0.01508 0.75165
1.04788 0.02292 -0.0502 0.02957
0.99049 -0.01706 -0.00923
0.01508 0.75165
Exif Byte Order Big-endian (Motorola, MM) Big-endian (Motorola, MM)
Orientation Horizontal (normal) Horizontal (normal)
X Resolution 72 72
Y Resolution 72 72
Resolution Unit inches inches
Exif Image Width 366 366
Exif Image Height 270 270
Encoding Process Baseline DCT, Huffman coding Baseline DCT, Huffman coding
Bits Per Sample 8 8
Color Components 3 3
Y Cb Cr Sub Sampling YCbCr4:4:4 (1 1) YCbCr4:2:0 (2 2)
Image Size 366x270 366x270
Megapixels 0.099 0.099

Page 12 of 17
2. Timeline
Time Charlie Pat Terry
Mon, 16 Nov 2009 Employment Commences
Thu, 19 Nov 2009
10:39:24 -0800
Google Search for
"steganography"

Thu, 19 Nov 2009
10:42:17 -0800
Download Invisible
Secrets 2.1

Wed, 19 Nov 2009
10:43:32 -0800
Install Invisible Secrets
Tue, 24 Nov 2009
13:19:22 -0800
Google Search for "7zip"
Tue, 24 Nov 2009
13:19:32 -0800
Download 7-Zip
Tue, 24 Nov 2009
13:57:05 -0800
Google Search for "hex
editor"

Tue, 24 Nov 2009
13:40:45 -0800
Run Invisible Secrets 2.1
(2nd execution
according to deleted
prefetch)

25 Nov - 29 Nov Holidays
Mon, 30 Nov 2009
08:48:17 -0800
Run Invisible Secrets 2.1
(4th time according to
prefetch)

Wed, 02 Dec 2009
13:04:29 -0800
Email to
jaime@project2400.com

Wed, 02 Dec 2009
13:25:45 -0800
Email to
jamie@project2400.com

Thu, 03 Dec 2009
09:17:39 -0800
Extract skl0g




学霸联盟
essay、essay代写