Professional Documents
Culture Documents
Case 1 Files
Case 1 Files
Case 1 Files
COMMANDS:
C:\Users\batch1\Desktop\stegdetect>stegdetect -t p *.jpg
C:\Users\batch1\Desktop\stegdetect>stegdetect -n -t p *.jpg
to1 (2)
hidepic.jpg
Loaded 1 files...
phidepic.jpg
Loaded 1 files...
depic.jpg
Loaded 1 files...
jphidepic.jpg : jphide[v5](gumbo)
phidepic2.jpg
Loaded 1 files...
depic2.jpg
Loaded 1 files...
jphidepic2.jpg : jphide[v5](gator)
NTFS
QN 4) Provide the account name and last login information for each account present in
Mantooth
QN 5) If there is any evidence of .exe file being deleted, describe the artifact name and
document your findings
There are totally 7 executable files in the disk. But none of the *.exe deleted file was
deleted.No file has the mark of red cross, indicating deletion of file.
QN 6) Find proof of communication with Gladiator
document created?
Pranic Vampire
This is a more common and possibly more correct term for psychic vampire. Prana is the
Sanskrit word meaning "life energy", Which does more accurately describe the energy that we
feed on.
Pranic Vampires have a broken or in most cases removed Chakra, Generally the Navel, but in
some cases the Heart Chakra. Often times this type of Psychic vampire has a completely
reworked energy system.
Pranic vampire is generally a catch all term and may encompass the other types or psychic
vampires as well.
In happy.mpeg, there is a person who gets irritated and thrashes the keyboard towards the
monitor hastly, then hurrying out from his desk and barging out of the office. After this the man
disappears from the view of camera. There was an another man who looks at what was
happening when the guy got frustrated and blew up up the computer and left the place.
artifacts.
CRIMES DONE :
An encased filecontains information about a drug dealer who has pictures of cocaine,
meth and more drugs. The criminal also is involved in stealing ATM cards. We have web search
history and the pictures in the disk which proves that the person is clearly involved in this. There
are some E-mails, encrypted files, pictures, remote disk, information of operating systems and 6
releveant e-mail address which all support and aid in the proceeding of this case.
QN 12) Mantooth received one Text Internet Email that had no subject about a
stolen ATM. Who sent it to him (name and email) and when was it sent?
Timings :